KB Vuln Final
作者: jason huawen
识别目标主机IP地址
- ─(kali㉿kali)-[~/Desktop/Vulnhub/KBVuln4]
- └─$ sudo netdiscover -i eth1 -r 192.168.56.0/24
- Currently scanning: 192.168.56.0/24 | Screen View: Unique Hosts
-
- 3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180
- _____________________________________________________________________________
- IP At MAC Address Count Len MAC Vendor / Hostname
- -----------------------------------------------------------------------------
- 192.168.56.1 0a:00:27:00:00:11 1 60 Unknown vendor
- 192.168.56.100 08:00:27:ab:da:3f 1 60 PCS Systemtechnik GmbH
- 192.168.56.184 08:00:27:0e:f6:a9 1 60 PCS Systemtechnik GmbH
复制代码 利用Kali Linux的netdiscover工具识别目标主机的IP地址为192.168.56.184
NMAP扫描
[code]──(kali㉿kali)-[~/Desktop/Vulnhub/KBVuln4]└─$ sudo nmap -sS -sV -sC -p- 192.168.56.184 -oN nmap_full_scanStarting Nmap 7.92 ( https://nmap.org ) at 2023-04-11 22:15 EDTNmap scan report for localhost (192.168.56.184)Host is up (0.00013s latency).Not shown: 65533 closed tcp ports (reset)PORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)| ssh-hostkey: | 2048 cd:15:fb:cc:47:de:a3:16:e9:b8:6b:61:7a:25:5a:b7 (RSA)| 256 82:a5:1b:08:06:12:c0:36:38:e7:53:18:47:ea:3f:f8 (ECDSA)|_ 256 f4:d9:65:bd:7d:68:03:31:c3:64:06:48:1d:fb:e7:47 (ED25519)80/tcp open http Apache httpd 2.4.29 ((Ubuntu))|_http-server-header: Apache/2.4.29 (Ubuntu)|_http-title: Hacked!| http-git: | 192.168.56.184:80/.git/| Git repository found!| .gitignore matched patterns 'bug'| Repository description: Unnamed repository; edit this file 'description' to name the...| Last commit message: |