- 2024-08-14Vulnhub JIS-CTF靶机详解
项目地址https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/修改靶机的网卡开机时长按shift,进入此页面选择root模式进入将只读模式改为读写模式mount-oremount,rw/查看本机的网卡名称ifconfig-a修
- 2024-07-08vulnhub - JIS-CTF
vulnhub-JIS-CTF这个靶场一共有5个flag信息收集靶机ip:192.168.157.172kaliip:192.168.157.161nmap192.168.157.0/24nmap-sT--min-rate10000-p-192.168.157.172sudonmap-sT-sV-sC-O-p22,80192.168.157.172一眼看到robots.txtUser-agent:*Disallow:/D
- 2024-05-19vulnhub--JIS靶场
环境搭建kali(攻击机,NAT):192.168.96.4靶机(linux,NAT):ip未知信息收集主机探测netdiscover-i监听网卡发现96网段存活主机,猜测是96.5为靶机地址端口扫描nmap-sS-v192.168.96.5(高校快速的扫描,TCP半链接扫描) nmap-A192.168.96.5(全面扫描,更全面)fscan既可以扫端口又