玩儿转vulnhub靶场系列


  • brief introduction
  • Table of contents
  • Latest documents

    BJ06 hacksudo-3

    1. 信息收集 1.1. 主机探测 netdiscover -r 192.168.159.0/24 1.2. 端口扫描 仅扫描到了 80,还有个 /textpattern/textpattern/ 目录 1.3. Web 信息收集 扫目录 /textpattern/textpattern/ 下是 TextPattern CMS 的登录页面,爆破估计没戏…… 根据提示继续扫目录 找到个………

    myh0st - June 10, 2025, 10:08 a.m.


    BJ08 inclusiveness-1

    信息搜集 端口扫描 rustscan -a 192.168.159.14 --range 1-65535 --ulimit 5000 -- -A 21:ftp,显示存在匿名登录 22:ssh 80:web服务,apache/2.4.38 Debian 目录扫描 dirsearch -u http://192.168.159.14 存在robots.txt文件,manual是apache………

    myh0st - June 10, 2025, 9:56 a.m.


    BJ09 sar-1

    信息搜集 端口扫描 rustscan -a 192.168.159.35 --range 1-65535 --ulimit 5000 -- -A 22:ssh 80:web服务,apache httpd 2.4.29(Ubuntu) 目录扫描 dirsearch -u http://192.168.159.35 漏洞发现和利用 尝试文件上传 访问robots.txt发现隐藏目录sar2………

    myh0st - June 10, 2025, 9:54 a.m.


    BJ10 hacklab-vulnvoip

    Let's go plain Nmap scan report for 192.168.1.67 Host is up (0.0075s latency). Not shown: 994 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) | ssh………

    myh0st - Jan. 16, 2025, 4:17 p.m.


    BJ08 bobby-1

    Service Fingerprinting As the virtual machine comes pre-configured with a static IP address of 192.168.1.11, I skipped host discovery and began looking for and fingerprinting services instead. I load………

    myh0st - Jan. 16, 2025, 4:10 p.m.


    BJ06 exploit-kb-vulnerable-web-app-1

    Host discovery First, we need to discover where the machine is on our network. To do so, let’s use Nmap: undefined nmap -sP 192.168.1.1/24 Fingerprinting After getting the IP address, we need to do s………

    myh0st - Jan. 16, 2025, 4:09 p.m.


    BJ07 lampsecurity-ctf6

    Au passage, attention à ne pas ouvrir le PDF qui est présent dans l'archive car il contient la solution et le CTF perdrait son intérêt. Au début était le scan plain Starting Nmap 6.46 ( http://nmap………

    myh0st - Jan. 16, 2025, 4:03 p.m.


    BJ05 no-exploiting-me-1

    Mais rassurez-vous : dans mon immense générosité, je vous donne ici l'adresse MAC d'origine pour que vous n'ayez plus qu'à la mettre correctement dans les préférences de la VM : 08:00:27:ae:1f:6e. ………

    myh0st - Jan. 16, 2025, 4:02 p.m.


    BJ09 morning-catch-phishing-industries

    Recon Our target is the Morning Catch company, our first reconnaissance step should be exploring their Internet presence at http://morningcatch.ph: On the website we find a list of contacts on the ………

    myh0st - Jan. 16, 2025, 3:55 p.m.


    BJ02 pentester-lab-from-sql-injection-to-shell

    B. Methodology I've installed the image I'm going to use and I see that it's a debian virtual machine. Given that I have access to a command prompt, my first instinct is to run an ifconfig to retriev………

    myh0st - Jan. 16, 2025, 3:53 p.m.



    myh0st , 02bin