VulnHub walkthrough

2017-12-12  本文已影响0人  satyrs_sh

Necromancer

arp -scan -l

 [#nat](chrome-extension://hmjkmjkepdijhoojdojkdfohbdgmmhki/#label/nat)

nmap 192.168.224.132

tshark -l eht0

nc -l 4444

nc -nvlp 4444

base64 -d -

base64 -di code

#hashcat -b

hashcat64.exe -a 0 -m 0 hash.txt des.txt -r ...rule

nc -nvu 192.168.224.132 666 (pass:opensesame)

hit enter

id; do a quick buffer flow

# 现在打开了port

binwalk ****.jpg #zip archive in a picture

binwalk --dd=''.*" ***.jpg

ls -al

cd extracted_dir

unzip somename

cat ***.txt

cat ***.txt | base64 -d;echo

#将hash放入hash.txt

gobuster -s 200 -u 192.168.244.132/somekeyornameyougotbefore/ -w /usr/share/wordlists/

server image

上一篇 下一篇

猜你喜欢

热点阅读