打靶记录(六九)之THMShaker
端口扫描nmap --min-rate=10000 -p- 10.10.69.42Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-12 01:26 UTCNmap scan report for ip-10-10-69-42.eu-west-1.compute.internal (10.10.69.42)Host is up (0.0046s latency).Not shown: 65513 filtered tcp ports (no-response), 19 filtered tcp ports (admin-prohibited)PORT STATE SERVICE22/tcp open ssh8080/tcp open http-proxyMAC Address: 02:48:8D:30:46:3B (Unknown)Nmap done: 1 IP address (1 host up) scanned in 13.40 seconds
nmap -sT -sC -sV -O -p22,8080 ...
打靶记录(六七)之THMTempusFugitDurius
端口扫描nmap --min-rate=10000 -p- 10.10.150.223Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-09 10:27 UTCNmap scan report for ip-10-10-150-223.eu-west-1.compute.internal (10.10.150.223)Host is up (0.0025s latency).Not shown: 65531 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open http111/tcp open rpcbind36473/tcp open unknownMAC Address: 02:04:33:21:A6:4F (Unknown)Nmap done: 1 IP address (1 host up) scanned in 3.84 seconds
nmap -sT -sC -sV -O -p22,80,111,364 ...
打靶记录(六六)之THMTemple
端口扫描nmap --min-rate=10000 -p- 10.10.194.47Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-07 12:14 UTCNmap scan report for ip-10-10-194-47.eu-west-1.compute.internal (10.10.194.47)Host is up (0.027s latency).Not shown: 65529 closed tcp ports (reset)PORT STATE SERVICE7/tcp open echo21/tcp open ftp22/tcp open ssh23/tcp open telnet80/tcp open http61337/tcp open unknownMAC Address: 02:0A:D4:98:3C:7F (Unknown)Nmap done: 1 IP address (1 host up) scanned in 7.35 seconds
n ...
标日初上语法总结
形容词一二类形容词一类形容词以“い”结尾的形容词,谓语后面要加“です”
否定形式:
将词尾的“い”变成”く“再加上”ないです”或“ありません”
作谓语的过去式:
将词尾的”い”变成”かった”再加上”です”。
过去式否定形式:
把词尾的”い”变成”くなかったです”或者”くありませんでした”
二类形容词二类形容词是不以”い”结尾的形容词。做谓语时要在后面加上”です”。过去式是”でした”
て形一类形容词是将词尾的”い”变为”くて”
二类形容词直接后面加”で”
なりますなります表示性质或状态的变化
一类形将词尾”い”变成”く”再加なります
暖かい→暖かくなります
二类形二类型/名词后直接加上になります
动词三类动词动词的”ます”形去掉”ます“
一类动词:最后一个音位于”い”段的动词绝大部分
二类动词:最后一个音位于”え”段的动词
三类动词:“来ます”,“します”,”勉強します“,”卒業します“等使用”します“的动词
基本形一类:
去掉ます、い段变う段
二类:
去掉ます加上る
三类
来る、する
句式表示能力名词(人)动词基本形+ことができます
スミスさんはピアノを弾くことができます
表示一个动词 ...
打靶记录(六五)之THMPlotted-EMR
端口扫描nmap --min-rate=10000 -p- 10.10.156.65Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-05 13:59 UTCNmap scan report for ip-10-10-156-65.eu-west-1.compute.internal (10.10.156.65)Host is up (0.0060s latency).Not shown: 65530 closed tcp ports (reset)PORT STATE SERVICE21/tcp open ftp22/tcp open ssh80/tcp open http5900/tcp open vnc8890/tcp open ddi-tcp-3MAC Address: 02:5B:3A:A9:84:27 (Unknown)Nmap done: 1 IP address (1 host up) scanned in 3.44 seconds
nmap -sT -sV -sC -O -p21,22 ...
23-11杂谈
11月也是非常快速地就过去了。毕竟一半时间都被该死地军训给占了,也是非常的累非常浪费时间,不过也许以后回忆起来还是会比较怀念的吧。不过在那期间也是好好地在HTB学了些缓冲区溢出还有一些别的,HTB还是非常详细的。然后这个月也是沉迷于键政,也算是极大的开拓了视野吧,非常有趣(bushi。然后月末也就是在准备半期考。不得不说python黑帽子那本书写的真不错!
打靶记录(六四)之THMMisguidedGhosts
端口扫描nmap --min-rate=10000 -p- 10.10.212.161Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-05 03:27 UTCNmap scan report for ip-10-10-212-161.eu-west-1.compute.internal (10.10.212.161)Host is up (0.0044s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE21/tcp open ftp22/tcp open sshMAC Address: 02:77:28:55:D0:B3 (Unknown)Nmap done: 1 IP address (1 host up) scanned in 3.46 seconds
nmap -sT -sV -sC -O -p21,22 10.10.212.161Starting Nmap 7.93 ( https://nmap.org ) at 2023-12 ...
打靶记录(六三)之THMMotunui
端口扫描sudo nmap --min-rate 10000 -p- 10.10.201.190Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-04 03:43 UTCNmap scan report for 10.10.201.190Host is up (0.38s latency).Not shown: 65529 filtered tcp ports (no-response)PORT STATE SERVICE22/tcp open ssh80/tcp open http139/tcp open netbios-ssn445/tcp open microsoft-ds3000/tcp open ppp5000/tcp open upnpNmap done: 1 IP address (1 host up) scanned in 22.91 seconds
sudo nmap -sT -sV -sC -O -p22,80,139,445,3000,5000 10.10.201.190 ...
渗透测试中shellshock攻击原理介绍以及条件使用
概念介绍CGI(Common Gateway Interface)用于在Web服务器和应用程序之间传递信息。它允许Web服务器调用外部程序(通常是脚本),并将用户请求传递给这些程序,然后将程序生成的结果返回给用户。
Shellshock,又称Bashdoor,是在Unix中广泛使用的Bash shell中的一个安全漏洞,首次于2014年9月24日公开。许多互联网守护进程,如网页服务器,使用bash来处理某些命令,从而允许攻击者在易受攻击的Bash版本上执行任意代码。这可使攻击者在未授权的情况下访问计算机系统。
shellshock存在于Bash(Bourne Again SHell)软件中。这个漏洞允许攻击者通过构造特殊的环境变量,在受影响的系统上执行任意的Shell命令。Shellshock 漏洞曝露了许多Web服务器上运行的CGI脚本的风险,因为这些脚本可能会调用Bash解释器,并由于漏洞而受到攻击。
利用Shellshock漏洞执行的条件1、影响的 Bash 版本主要是在 1.14 到 4.3 之间2、可以猜出/cgi-bin/下目录的文件;例如:/cgi-bin/test-cg ...
打靶记录(六二)之THMUranium CTF
端口扫描sudo nmap --min-rate 10000 -p- 10.10.254.128Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-03 14:59 UTCNmap scan report for 10.10.254.128Host is up (0.23s latency).Not shown: 65532 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh25/tcp open smtp80/tcp open httpNmap done: 1 IP address (1 host up) scanned in 10.45 seconds
sudo nmap -sT -sV -sC -O -p22,25,80 10.10.254.128 Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-03 15:0 ...
打靶记录(六一)之THMGameBuzz
端口扫描sudo nmap --min-rate 10000 -p- 10.10.187.188Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-02 14:35 UTCNmap scan report for 10.10.187.188Host is up (0.24s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE22/tcp filtered ssh80/tcp open httpNmap done: 1 IP address (1 host up) scanned in 12.08 seconds
sudo nmap -sT -sV -sC -O -p22,80 10.10.187.188Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-02 14:36 UTCNmap scan report for 10.10.187.188Host is up (0.16s la ...
打靶记录(六十)之THMCyberCraft
端口扫描sudo nmap --min-rate 10000 -p- 10.10.180.170 Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-02 01:48 UTCNmap scan report for 10.10.180.170Host is up (0.23s latency).Not shown: 65532 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open http25565/tcp open minecraftNmap done: 1 IP address (1 host up) scanned in 11.73 seconds
sudo nmap -sT -sV -sC -O -p22,80,25565 10.10.180.170Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-02 01:49 UTCNmap scan report for ...