In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article introduces how to analyze the loopholes in CTF shooting range. The content is very detailed. Interested friends can use it for reference. I hope it will be helpful to you.
Actual combat exercise
Use the netdiscover command to find the IP of the target machine.
Use nmap to view the open ports of the target machine
Open the browser
There is a CVE-2007-1860 vulnerability in this target, http://192.168.0.103/examples/jsp/%252e%252e/%252e%252e/manager/html.
After opening it, the browser will pop up an input box, enter admin for the account, and log in successfully if the password is empty.
Then upload the war Trojan to get the permission.
On how to carry out CTF range loophole analysis is shared here, I hope that the above content can be of some help to you, can learn more knowledge. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.