信息搜集arp-scan -l扫描靶机地址 123456789┌──(root㉿kali)-[~/Desktop/tmp]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c...
HackmyVM-find
信息搜集arp-scan -l 1234567┌──(root㉿kali)-[~/Desktop/tmp]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:ff:6...
HackmyVM-hotel
信息搜集arp-scan -l 1234567┌──(root㉿kali)-[~/Desktop/tmp]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:ff:6...
春秋云镜-Initial
FLAG1首先进行信息搜集 123456789101112131415161718192021222324252627282930┌──(root㉿kali)-[~/Desktop/tmp]└─# ../pentest/fscan/f...
春秋云镜-Delegation
FLAG1首先对靶机进行信息搜集 12345678910111213141516171819202122232425262728┌──(root㉿kali)-[~/Desktop/tmp]└─# ../pentest/fscan/fs...
HackmyVM-system
信息搜集arp-scan -l 1234567┌──(root㉿kali)-[~/Desktop/tmp]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:ff:6...
HackmyVM-Blackhat
信息搜集arp-scan -l扫描 1234567┌──(root㉿kali)-[~/Desktop/tmp]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:ff...
春秋云镜-Certify
FLAG1先用fscan扫一扫 1234567891011121314151617181920212223242526272829┌──(root㉿kali)-[~/Desktop/tmp]└─# ../pentest/fscan/f...
春秋云镜-Brute4Road
FLAG1&FLAG2先用fscan扫一下 1234567891011121314151617181920212223242526272829303132┌──(root㉿kali)-[~/Desktop/tmp]└─# .....
春秋云镜-Hospital
flag01首先扫描一下端口,有一个22端口和8080端口,然后用fscan对这两个端口进行扫描,可以扫到一个heapdump泄露 1234567891011121314151617181920┌──(root㉿kali)-[~/De...