Blocky(源码泄露、java反编译) 10.10.10.37 123421/tcp open ftp ProFTPD 1.3.5a22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.4.18 ((Ubuntu))2 2019-01-19 training training
Active(windows smb共享硬盘) 参考资料:smbclient scan1234567891011121314151617181920212223242526272853/tcp open domain Microsoft DNS 6.1.7601| dns-nsid: |_ bind.version: Microsoft DNS 6.1.7601 (1DB15D39)88/tcp open ker 2019-01-15 training training
Access(port:23-telnet登入反弹cmd) 123456789101112Nmap scan report for 10.10.10.98Host is up (0.13s latency).Not shown: 997 filtered portsPORT STATE SERVICE21/tcp open ftp23/tcp open telnet80/tcp open httpnmap -sV -p 21,23,80 10.1 2019-01-11 training training windows port 23
Devel(ftp匿名登陆可读可写) 10.10.10.5 12321/tcp open ftp Microsoft ftpd80/tcp open http Microsoft IIS httpd 7.5 ftp12345678910111213141516171819ftp 10.10.10.5anonymous03-18-17 01:06AM <DIR> aspnet 2019-01-10 training training windows port 21
masscan结合python快速枚举批量主机端口 还记得当时360电话面试的时候,问我互联网上最快的扫描器是什么,我回答的zenmap? 最近渗透测试的实习,给了很多主机,记录一下。 python去重 123456789ips = []write_ips = open('ips.txt','a')with open('1.txt') as f: for line in f: ips. 2019-01-09 scan
论传销 论传销写这篇文章的起因。 最近苹果手机电池不行了,一到百分之30就噌噌噌往下掉。于是我上班的间歇,就找了个手机维修店。店主把我的手机拆开,然后让我等十多分钟,还拿着吹风机吹。然后就出门了,让我等一会儿。 我百无聊赖的也不知道干什么,盯了一会儿拆下来的电池。电池居然是软的,被掰弯了== 期间,有一个搞推销的青年走了进来。一开始给店员推销,店员拼命拒绝。他的脖子上很明显的钴蓝色带子,挂着的应该是证件, 2019-01-08 View View
Joker(http-proxy) 10.10.10.21 scan1222/tcp open ssh OpenSSH 7.3p1 Ubuntu 1ubuntu0.1 (Ubuntu Linux; protocol 2.0)3128/tcp open http-proxy Squid http proxy 3.5.12 web目录扫描,连接时间异常,没有找到任何页面 trying1:缓冲区溢出searchs 2019-01-07 training training
Grandpa(msf栈溢出) 10.10.10.14 scan80/tcp open http Microsoft IIS httpd 6.0 只开了一个80端口,iis 6.0让我想到了文件解析漏洞 os scan:Running (JUST GUESSING): Microsoft Windows 2003|2008|2000|XP (91%) webanyway,先扫一下web目录吧~~只有一个img目录,403 2019-01-06 training training
Popcorn(文件上传) scan12322/tcp open ssh OpenSSH 5.1p1 Debian 6ubuntu2 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.2.12 ((Ubuntu))PHP/5.2.10-2ubuntu6.10 web先检查破壳漏洞,然后检查/test目录泄露的信息 123456789101 2019-01-04 training training
lame(samba) 10.10.10.3 scan139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) linux os 这个training应该很简单,以前做过:139端口——smbclient kiotrix靶机(139端口samba) 得知服务版本Samba 3.0.20-Debian trying 1 123456789 2019-01-03 training training