- 2024-11-13Vulnhub Jarbas
VulnhubJarbas0x01:端口扫描主机发现nmap-sn192.168.231.0/24全端口详细扫描nmap-sT-sC-sV-O-p-192.168.231.134-oA/root/scan发现有3个服务,22ssh,80http,3306mysql,8080http接下来对http进行漏洞扫描nmap--script=vuln-p80192.168.231.134似乎有csrf
- 2024-11-08打靶记录-Jarbas
靶机下载vulnhub->Jarbas确定靶机nmap-sn192.168.52.0/24靶机ip:192.168.52.130扫描全端口开放情况nmap-sT192.168.52.130-p--oA./ports详细扫开放的端口nmap-sT-sC-sV-O192.168.52.130-p22,80,3306,8080-oA./details扫udp端口开放nmap-sU--top-po
- 2024-09-21打靶记录-Jarbas-Jenkins
靶机链接https://www.vulnhub.com/entry/jarbas-1,232/主机发现端口扫描扫描网段存活主机,因为主机是我最后添加的,所以靶机地址是135的nmap-sP192.168.75.0/24//StartingNmap7.93(https://nmap.org)at2024-09-2114:03CSTNmapscanreportfor192.168.75.
- 2024-08-15vulnhub - Jarbas
vulnhub-Jarbas信息收集sudonmap-sT-sV-sC-O-p22,80,3306,8080192.168.157.176sudonmap-script=vuln-p22,80,3306,8080192.168.157.176有robots.txt#wedon'twantrobotstoclick"build"links8080是后台登录目录扫描扫一下目录(不指定-xphp,html
- 2024-06-03jarbas
主机发现和nmap扫描nmap-sn192.168.56.0/24靶机ip:192.168.56.104nmap-sT--min-rate10000192.168.56.104PORTSTATESERVICE22/tcpopenssh80/tcpopenhttp3306/tcpopenmysql8080/tcpopenhttp-proxynmap-sT-sV-sC-O-p22,80,3306,8080192