• HMV Zon 靶机复盘

    信息收集1234567IP=192.168.0.196nmap $IPPORT STATE SERVICE22/tcp open ssh80/tcp open http 开了两个端口,打开网页看一眼。是一个咖啡豆的网站。扫一波目录 12345...
  • HMV Canto

    信息收集12345IP=192.168.0.194nmap $IP22/tcp open ssh80/tcp open http 访问看看,是一个简单的页面,啥都没有。跑一波目录 1234567891011121314gobuster dir ...
  • Vulnyx Yincana

    信息收集先扫一波 12345678910111213IP=192.168.0.210nmap $IPStarting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-04 17:38 HKTNmap scan...
  • HMV Lab Temperance

    For people who plays CTF and wants to program some shit. levelx00123456789101112131415161718192021222324# Connect to the ho...
  • Vulnyx Listen

    信息收集12345678910111213IP=192.168.0.187nmap $IPStarting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-31 12:59 HKTNmap scan repo...
  • HMV Dentacare

    信息收集NAMP 扫描1234567891011IP=192.168.0.178nmap $IPStarting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-24 08:28 HKTNmap scan r...
  • M1 电脑用 UTM 导入 ova 靶机

    背景用 M1 好几年了,一直用 x86 的机器跑 Virtual Box,才能跑靶机。M1 的 Mac 上用 UTM 跑 kali。总归不方便,最近发现大家用 UTM 跑靶机,虽然麻烦了点,但是还是可以用的。 步骤把下载的 ova 换成 qcow2参...
  • HMV Supra

    https://hackmyvm.eu/machines/machine.php?vm=Supra

    信息收集

    NAMP 扫描

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    IP=192.168.0.197



    nmap -sV -T5 -Pn -p- $IP
    # -sV Probe open ports to determine service/version info , # 识别服务/版本
    # -T5 Set timing template (higher is faster) # 5是最快的了
    # -Pn Treat all hosts as online -- skip host discovery # 不进行主机发现
    # -p- Scan all ports # 扫描所有端口

    PORT STATE SERVICE VERSION
    22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
    80/tcp open http Apache httpd 2.4.48 ((Debian))
    4000/tcp open http Node.js (Express middleware)
    Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  • HMV convert 靶机复盘

    信息收集NAMP 扫描12345678910IP=192.168.0.190nmap -sV -T5 -Pn -p- $IPHost is up (0.022s latency).Not shown: 64756 closed tcp ports ...
  • HMV Quick

    信息收集

    NAMP 扫描

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    IP=192.168.0.189



    nmap -sV -T5 -Pn -p- $IP
    # -sV Probe open ports to determine service/version info , # 识别服务/版本
    # -T5 Set timing template (higher is faster) # 5是最快的了
    # -Pn Treat all hosts as online -- skip host discovery # 不进行主机发现
    # -p- Scan all ports # 扫描所有端口

    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-15 09:48 HKT
    Nmap scan report for 192.168.0.189
    Host is up (0.020s latency).
    Not shown: 65534 closed tcp ports (conn-refused)
    PORT STATE SERVICE VERSION
    80/tcp open http Apache httpd 2.4.41 ((Ubuntu))

    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 20.18 seconds


/7