打靶记录(八九)之HMVPickle
所渗透的靶机IP为192.168.56.112
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.112 Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-13 13:08 UTCNmap scan report for 192.168.56.112 (192.168.56.112)Host is up (0.00011s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE21/tcp open ftp1337/tcp open wasteMAC Address: 08:00:27:87:E1:35 (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 2.88 seconds
sudo nmap -sT -sV -sC -O -p21,1337 192.168.56.112 ...
打靶记录(八八)之HMVKitty
所渗透的靶机IP是192.168.56.111
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.111Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-12 03:05 UTCNmap scan report for 192.168.56.111 (192.168.56.111)Host is up (0.00040s latency).Not shown: 65532 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open http3000/tcp open pppMAC Address: 08:00:27:4E:6A:BE (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 3.03 seconds
sudo nmap -sT -sV -sC -O -p22,80,3000 192 ...
打靶记录(八七)之HMVFianso
所渗透的靶机IP为192.168.56.108
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.108Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-09 13:20 UTCNmap scan report for 192.168.56.108 (192.168.56.108)Host is up (0.00013s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh8000/tcp open http-altMAC Address: 08:00:27:28:71:8F (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 2.68 seconds
sudo nmap -sT -sV -sC -O -p22,8000 192.168.56.108Starti ...
打靶记录(八六)之HMVPerlman
所渗透的靶机IP为192.168.56.106
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.106Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-06 06:32 UTCNmap scan report for 192.168.56.106 (192.168.56.106)Host is up (0.00029s latency).Not shown: 65529 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh25/tcp open smtp80/tcp open http110/tcp open pop3119/tcp open nntp995/tcp open pop3sMAC Address: 08:00:27:18:54:B8 (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 2.5 ...
打靶记录(八五)之HMVOmura
所渗透的靶机IP为192.168.56.105
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.105[sudo] mikannse 的密码:Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-05 09:33 UTCNmap scan report for 192.168.56.105 (192.168.56.105)Host is up (0.00012s latency).Not shown: 65532 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open http3260/tcp open iscsiMAC Address: 08:00:27:FA:75:8C (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 3.30 seconds
sudo nmap -sT -sV - ...
打靶记录(八四)之HMVRegistry
所渗透的靶机是192.168.56.104
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.104[sudo] mikannse 的密码:Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-04 04:12 UTCNmap scan report for 192.168.56.104 (192.168.56.104)Host is up (0.00010s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open httpMAC Address: 08:00:27:49:23:DF (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 3.12 seconds
sudo nmap -sT -sV -sC -O -p22,80 192.168.56.104 ...
打靶记录(八三)之HMVAlive
主机发现所渗透的主机是192.168.56.103
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.103Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-03 04:52 UTCNmap scan report for 192.168.56.103 (192.168.56.103)Host is up (0.00037s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open httpMAC Address: 08:00:27:1D:38:66 (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 2.41 seconds
sudo nmap -sT -sV -sC -O -p22,80 192.168.56.103 ...
打靶记录(八二)之HMVTiny
主机发现sudo nmap -sn 192.168.56.0/24
192.168.56.101是靶机IP
端口扫描sudo nmap --min-rate 10000 -p- 192.168.56.101Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-02 07:22 UTCNmap scan report for 192.168.56.101 (192.168.56.101)Host is up (0.00013s latency).Not shown: 65532 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh80/tcp open http8888/tcp open sun-answerbookMAC Address: 08:00:27:A2:36:11 (Oracle VirtualBox virtual NIC)Nmap done: 1 IP address (1 host up) scanned in 4.50 seconds
...
24-1杂谈
24年的第一个月啊。前半段时间总之是在复习期末考,也是非常无聊。放假之后就是一直开摆吧,这才叫假期啊,非常巴适。网安的东西也是一个月没碰了233
关于渗透测试中内网穿透问题
前言在内网渗透中经常遇到在需要利用已经拿到权限的机器来进行内网穿透来访问内网中的其他机器。于是本文用于整理和学习自己之前常用的一些方式。
先从8080端口入手,是一个shiro框架,可以用shiroattack直接一把梭拿到权限再做一个反弹shell
所用机器:
VPS,并且在上面安装了msf与搭建了靶场
kali
演示靶机采用
https://github.com/CTF-Archives/Puff-Pastry
8080是开设在外网的shiroWeb框架
在内网的8081开设了thinkphp服务
详细网络拓扑见github项目
反向SSH如果能拿到ssh登录权限的话
ssh -L target-port:localhost:port1 user@ip
-L参数指定目标机器上需要进行流量转发的端口转发到本机的port1
SOCAT需要在靶机上存在socat
sudo socat tcp-listen:target-port,reuseaddr,fork tcp:127.0.0.1:port1
target-port:对外开放的端口,可用于代理
port1:需要转发的端口
./s ...
2023年度总结
2023,进入大学之后的第二年呢。也许今年在人生中只是一个非常平常的一年的,如果用一个词来形容,大概是沉淀吧233从年初的跟着学长后面疯狂问的小学弟到了现在还算是有些积累的学长233仔细想来总算是在网安领域小入了个门吧(虽然不是很想这么说但事实确是如此233)然后也算是彻底奉献给了“渗透”吧,非常幸运,也是挺喜欢这个方向的,接下来一年也要继续沉淀!入学了一学期的懵懂期之后,也是逐渐老油条了起来233各种翘课什么的这才是带学生啊。在年中的时候创办了个人博客,也算是开始一些知识的积累和分享了吧,那几个月时间是知识快速积累的时候啊。编曲方面,经过一年的学习加实践历练,现在总算有了些许经验,也能够写出一首完整的曲子了呢,也是非常享受这个过程。总之今年的收获还是比较满意的吧,但是比较不足的是日语学习和课外阅读花的时间太少了,明年要继续努力啊。总之,今年是比较满意的一年吧,2024请多指教OK(ゝω・´★)
23-12杂谈
今年也要结束了呀。但其实感觉还是挺漫长的。虽然但是还是先写一下这个月的总结。过几天再写一篇年度总结好了。总之这个月也过得非常快啊,算是期中考试还算比较轻松的一个月吧。上上水课,愉快的打打thm,排名也是非常迅速地来到了6500左右。收获还算比较大吧。除此之外成功地入坑了绯染天空,非常符合我的电波www虽然也是一直处于一个摆烂状态在玩。然后天气也是急剧转冷,在今年快结束的几天成功的获得了流感,半死不活的,也是越来越厌恶上课了。不知道为什么,最后几天的心态,或者说是这一整个月的心态都非常的浮躁唉,无法冷静思考,冷静下来之后就感觉缺乏理性,总是草率地做出一些判断和决定,真是讨厌的感觉啊。元旦假期,期末复习的任务非常的重,也并不打算出去玩,预计是想找个地方冷静一下,好好思考些问题。此外,键政键多了逐渐变得非常虚无主义了(悲,啊,有种想就这样一事无成 无所事事地下去等待死亡的想法。