- 2023-06-28vulnhub靶场:Thales
靶场地址:泰雷兹:1~VulnHubkali:172.88.6.144靶场:172.88.6.81 nmap172.88.6.0/24 nmap-T4-sV-P -A172.88.6.81 访问http://172.88.6.81:8080/,发现是tomcat页面,登录需要账户,所以使用msf爆破下 msfconsolesearchtomcat useauxiliary/scanner/http/t
- 2022-12-11Vulnhub之Thales 1靶机测试过程
Thales1识别目标主机IP地址─(kali㉿kali)-[~/Vulnhub/Thales_1]└─$sudonetdiscover-ieth1Currentlyscanning:192.168.60.0/16|ScreenView:UniqueHo
- 2022-10-30vulnhub靶场之THALES: 1
准备:攻击机:虚拟机kali、本机win10。靶机:THALES:1,网段地址我这里设置的桥接,所以与本机电脑在同一网段,下载地址:https://download.vulnhub.com/thales/Thales.zip,下载解压
- 2022-08-30Thales: 1-vulnhub靶场
环境信息靶机:192.168.124.150攻击机:192.168.124.129打靶过程nmap扫描端口及服务发现开放了22,8080端口访问8080是apachetomcat欢迎页面目录扫描目录扫描