- 2024-09-21打靶记录-Jarbas-Jenkins
靶机链接https://www.vulnhub.com/entry/jarbas-1,232/主机发现端口扫描扫描网段存活主机,因为主机是我最后添加的,所以靶机地址是135的nmap-sP192.168.75.0/24//StartingNmap7.93(https://nmap.org)at2024-09-2114:03CSTNmapscanreportfor192.168.75.
- 2024-08-15vulnhub - Jarbas
vulnhub-Jarbas信息收集sudonmap-sT-sV-sC-O-p22,80,3306,8080192.168.157.176sudonmap-script=vuln-p22,80,3306,8080192.168.157.176有robots.txt#wedon'twantrobotstoclick"build"links8080是后台登录目录扫描扫一下目录(不指定-xphp,html
- 2024-06-03jarbas
主机发现和nmap扫描nmap-sn192.168.56.0/24靶机ip:192.168.56.104nmap-sT--min-rate10000192.168.56.104PORTSTATESERVICE22/tcpopenssh80/tcpopenhttp3306/tcpopenmysql8080/tcpopenhttp-proxynmap-sT-sV-sC-O-p22,80,3306,8080192