HackMyVm-pdf
pdf 靶机地址:https://hackmyvm.eu/machines/machine.php?vm=pdf 10.213.193.65 信息搜集端口扫描123456789101112131415161718192021222324252627282930313233343536373839404142434445root@LAPTOP-O235O5EH [~] ➜ rustscan -a 10.213.193.65 [16:23:15].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} &...
HackMyVm-Gameshell2
Gameshell2 靶机地址:https://hackmyvm.eu/machines/machine.php?vm=Gameshell2 信息搜集端口扫描 这里的79 端口是 TCP 协议的知名端口,对应网络服务为 Finger Protocol(手指协议) ,核心功能是查询远程或本地主机的用户登录信息、账户详情。 Web80目录扫描 其中users.html是用户名,前面又有finger协议可以枚举用户 Finger-用户枚举https://github.com/dev-angelist/Finger-User-Enumeration 这里需要改代码,因为不存在的用户,finger会返回no such user 1python3 finger_user_enumeration.py -t 192.168.100.74 -w /root/Desktop/ccc/users.html 可以看出dt是用户 /terminal爆破这里使用的是HTTP认证,格式是 用户名:密码 用 Base64 编码 后,放在请求头 Authorization:...
HackMyVm-Lazzycorp
Lazzycorp 信息搜集主机发现12345678root@LAPTOP-O235O5EH [~] ➜ arp-scan -l [17:43:21]Interface: eth0, type: EN10MB, MAC: 5e:bb:f6:9e:ee:fa, IPv4: 10.156.131.149Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)10.156.131.40 08:00:27:b7:a9:99 PCS Systemtechnik GmbH......3 packets received by filter, 0 packets dropped by kernelEnding arp-scan 1.10.0: 256 hosts scanned in 1.940 sec...
HackMyVm-Helpdesk
Helpdesk 靶机地址:https://hackmyvm.eu/machines/machine.php?vm=Helpdesk 信息搜集主机发现12345678root@LAPTOP-O235O5EH [~] ➜ arp-scan -l [15:15:56] Interface: eth0, type: EN10MB, MAC: 5e:bb:f6:9e:ee:fa, IPv4: 192.168.100.35Starting arp-scan 1.10.0 with 512 hosts (https://github.com/royhills/arp-scan)......192.168.100.76 08:00:27:e5:04:39 PCS Systemtechnik GmbH......41 packets received by filter, 0 packets dropped by kernelEnding ...
HackMyVm-Motto
Motto 靶机地址:https://hackmyvm.eu/machines/machine.php?vm=Motto 信息搜集10.156.131.124 端口扫描123456789101112131415161718192021222324252627282930313233343536373839404142434445root@LAPTOP-O235O5EH [~] ➜ rustscan -a 10.156.131.124 [11:24:53].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._...
MazeSec-113
11310.156.131.105 信息搜集TCP端口扫描123456789101112131415161718192021222324252627282930313233343536373839404142root@LAPTOP-O235O5EH [~] ➜ rustscan -a 10.156.131.105 [14:55:30].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |`-...
MazeSec-112
112192.168.100.35 信息搜集端口扫描1234567891011121314151617181920212223242526272829303132333435363738394041root@LAPTOP-O235O5EH [~] ➜ rustscan -a 192.168.100.35 [12:29:53].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |`-...
HackMyVm-React
React192.168.100.50 信息搜集123456789101112131415161718192021222324252627282930313233343536373839404142(venv) root@LAPTOP-O235O5EH [/opt/tools/cve/CVE-2021-3129] git:(main) ➜ rustscan -a 192.168.100.50 [19:15:42].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} ...
HackMyVm_Meltdown
Meltdown信息搜集192.168.100.42 端口扫描123456789101112131415161718192021222324252627282930313233343536373839404142root@LAPTOP-O235O5EH [~] ➜ rustscan -a 192.168.100.42 [10:44:49].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ ...
MazeSec_Moodle
Moddle10.213.193.76 信息搜集端口扫描123456789101112131415161718192021222324252627282930313233343536373839404142root@LAPTOP-O235O5EH [~] ➜ rustscan -a 10.213.193.76 [11:28:08].----. .-. .-. .----..---. .----. .---. .--. .-. .-.| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| || .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |`-...















