Frolic(CTF-like again) 10.10.10.111 scan1234567891011121314151617181920212223242526272829303132333435363738394041424344Nmap 7.70 scan initiated Fri Mar 22 16:23:48 2019 as: nmap -Pn -sV -sC -p22,137,139,445,1880,9999 -oN nm 2019-03-23 training training
Valentine(CTF-like also) 12345Discovered open port 22/tcp on 10.10.10.79 Discovered open port 443/tcp on 10.10.10.79 Discovered open port 80/tcp on 10.10. 2019-03-22 training training
Apocalyst(CTF-like) 1234567891022/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)| ssh-hostkey: | 2048 fd:ab:0f:c9:22:d5:f4:8f:7a:0a:29:11:b4:04:da:c9 (RSA)| 256 76:92:39:0a:57:bd:f0:03 2019-03-21 training training
shell-script(二) 案例三:写一个bash script,目的是扫描40台主机的全部端口,服务版本,生成以IP为目录的扫描结果。 扫描网段内在线主机 1234nmap -sn 10.10.10.0/24 -oA 123-oN 生成nmap类型扫描结果-oX-oG 生成gnmap、nmap、xml类型扫描结果,查看后gnmap比较适合解析。 123456789101112131415161718192021222324 2019-03-21 linux linux
Calamity(web rce) 12345678922/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)| ssh-hostkey: | 2048 b6:46:31:9c:b5:71:c5:96:91:7d:e4:63:16:f9:59:a2 (RSA)| 256 10:c4:09:b9:48:f1:8c:45:2 2019-03-21 training training
cronOS(域名查询) 123456Discovered open port 22/tcp on 10.10.10.13 Discovered open port 53/udp on 10.10.10.13 Discovered open port 80/tcp on 10.10 2019-03-16 training training
Nibbles(sudo no pass ) 端口扫描nmap -sS -Pn 10.10.10.75 -vv 12345678**22/tcp open ssh syn-ack ttl 63**30/tcp filtered unknown no-response**80/tcp open http syn-ack ttl 63**646/tcp 2019-03-14 training training
Carrier(snmp泄露敏感信息) scan12345678910111222/tcp open ssh OpenSSH 7.6p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)| ssh-hostkey: | 2048 15:a4:28:77:ee:13:07:06:34:09:86:fd:6f:cc:4c:e2 (RSA)| 256 37:be:de:07:0f:10:bb:2b: 2019-03-12 training training command execution
snmp&snmpwalk 161端口——snmp协议参考资料: http://www.freebuf.com/vuls/133517.html http://www.cnblogs.com/LittleHann/p/3834860.html SNMP = simple network manage protocol = 简单网络管理协议 一个路由器,用SNMP协议报告带宽利用率、冲突率等信息。当snmp协议 配置不当, 2019-03-11 tools tools
Irked(suid提权) info:1234567891011121314nmap -sS -Pn IP22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0)80/tcp open http Apache httpd 2.4.10 ((Debian))111/tcp open rpcbind 2-4 (RPC #100000)22/t 2019-03-10 training training