-
DockerLabs-AguaDeMayo-Walkthrough
信息收集服务探测在此之前,靶机部署花了我好长时间,由于我docker是在WSL里面的Ubuntu装的,同时我的WSL设置Network又是mirror就导致我kali无法正常访问Ubuntu中的docker容器,我利用靶机自带的自动部署脚本一键部署,... -
📝个人Git备忘录
-
OverTheWire-Bandit游戏
Level 0第零关的密码是bandit0,获取到第一关的密码是ZjLjTmM6FvvyRnrb2rfNWOZOTa6ip5If 123456789101112131415161718192021222324252627282930313233343... -
HackMyVM-Challenges-Crypto部分
04612345678910111213141516171819202122232425262728293031323334def caesar_decrypt(ciphertext, cipher_alphabet, plain_alphabet)... -
📝正则表达式个人备忘
🥳常见正则表达式用法汇总表:
正则表达式 描述 [abc]匹配 a或b或c其中的一个字符[^abc]匹配除了 a、b、c外的任何单个字符[a-zA-Z0-9]匹配任何字母或数字 .匹配除换行符外的任何字符 \s匹配任何空白字符(空格、制表符、换行符等) \S匹配非空白字符 \d匹配任何数字字符(等价于 [0-9])\D匹配非数字字符 \w匹配任何字母、数字或下划线字符(等价于 [a-zA-Z0-9_])\W匹配非单词字符(非字母、数字、下划线) \b匹配单词边界 \B匹配非单词边界 ^匹配字符串的开始 $匹配字符串的结束 a*匹配零个或多个 a字符a?匹配零个或一个 a字符a+匹配一个或多个 a字符a{3}匹配 a字符恰好重复 3 次a{3,}匹配 a字符重复 3 次或更多次a{3,5}匹配 a字符重复 3 到 5 次?非贪婪匹配(最小匹配) (abc)分组,捕获匹配的内容 (?:abc)非捕获分组,不捕获匹配的内容 a(?=b)正向断言,匹配前面是 a且后面是b的位置a(?!b)负向断言,匹配前面是 a且后面不是b的位置(?<=b)a反向断言,匹配前面是 b后面是a的位置(?<!b)a反向负向断言,匹配前面不是 b后面是a的位置(?<name>a)命名分组,捕获匹配的内容并命名为 name\k<name>引用命名分组 name\n引用第 n号捕获组\xhh匹配十六进制的字符 hh\uhhhh匹配 Unicode 字符 hhhh(四个十六进制数字)\u{hhhh}匹配 Unicode 字符 hhhh(四个十六进制数字,u标志启用)\cX匹配控制字符 X\0匹配空字符 \a匹配 alert 字符(响铃符号) \t匹配制表符(Tab) \n匹配换行符(Line feed) \v匹配垂直制表符 \f匹配换页符 \r匹配回车符 \e匹配 escape 字符 [\b]匹配退格符 我觉得正则还是挺好学的,稍微花个一下午的时间大概就全弄懂了,正则太强大了,学会对于数据筛查方便不少,hhh👌
-
HackMyVM-flower-Walkthrough
信息收集
服务探测
👌扫一下端口开放,可以看到只开放了80端口,开了http服务
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40┌──(kali㉿kali)-[~]
└─$ sudo arp-scan -l
[sudo] password for kali:
Interface: eth0, type: EN10MB, MAC: 00:0c:29:c2:9e:68, IPv4: 192.168.56.102
WARNING: Cannot open MAC/Vendor file ieee-oui.txt: Permission denied
WARNING: Cannot open MAC/Vendor file mac-vendor.txt: Permission denied
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.56.1 0a:00:27:00:00:0c (Unknown: locally administered)
192.168.56.100 08:00:27:20:e1:73 (Unknown)
192.168.56.107 08:00:27:38:65:68 (Unknown)
3 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 1.887 seconds (135.67 hosts/sec). 3 responded
┌──(kali㉿kali)-[~]
└─$ ip=192.168.56.107
┌──(kali㉿kali)-[~]
└─$ sudo nmap -sS -sV -A -p- $ip
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-26 07:23 EST
Nmap scan report for 192.168.56.107
Host is up (0.0011s latency).
Not shown: 65534 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
MAC Address: 08:00:27:38:65:68 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 1.06 ms 192.168.56.107
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.83 seconds页面是这样的,没有啥有价值的信息,扫了下目录,扫出一堆
apache的说明文档,哈哈哈🤣 -
HackMyVM-Opacity-Walkthrough
信息收集服务探测扫一下靶机开放哪些服务 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657... -
HackMyVM-VMessage-Walkthrough
信息收集服务探测常规扫一下开了哪些端口服务 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647┌──(kali㉿kali)-[~]... -
Vulnhub-Doubletrouble-Walkthrough
信息收集服务探测12345678910111213141516171819202122232425262728293031323334┌──(kali㉿kali)-[~]└─$ ip=192.168.56.103┌──(kali㉿kali)-[~]└... -
2024第七届浙江省大学生网络与信息安全竞赛决赛部分题解
MiscFinalSign打开附件发现有空白字符,猜测是Snow雪花隐写,工具下载:https://www.darkside.com.au/snow/ 直接下载32位的执行文件就行,-c提取出关键信息,异或的密钥为helloworld 12C:\U...