OSCP官方靶场-Blogger WP

OSCP靶场Blogger_WP渗透过程

关注泷羽Sec泷羽Sec-静安公众号,这里会定期更新与 OSCP、渗透测试等相关的最新文章,帮助你理解网络安全领域的最新动态。后台回复“OSCP配套工具”获取本文的工具

官网打开靶场或链接地址下载虚拟镜像:

https://www.vulnhub.com/entry/blogger-1,675/

信息收集

# Kali攻击机地址
192.168.45.205
# 靶机地址
192.168.185.217

扫描端口和目录

# 设置MTU
sudo ip link set dev tun0 mtu 1250
ip link show tun0
# 扫描端口
ports=$(sudo nmap -p- --min-rate=5000 -Pn 192.168.185.217 | grep '^[0-9]' | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)
echo $ports
# 扫描服务
sudo nmap -sT -sC -sV -O -Pn -p$ports 192.168.185.217
sudo nmap --script=vuln -p$ports -Pn 192.168.185.217
# 扫描目录
dirsearch -u http://192.168.185.217/ -x 302,403  -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
whatweb http://192.168.185.217/

扫描结果如下:

┌──(kali㉿kali)-[~/Desktop/Blogger]
└─$ echo $ports
22,80

┌──(kali㉿kali)-[~/Desktop/Blogger]
└─$ sudo nmap -sT -sC -sV -O -Pn -p$ports 192.168.185.217
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-02 07:28 EDT
Nmap scan report for bogon (192.168.185.217)
Host is up (0.21s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   2048 95:1d:82:8f:5e:de:9a:00:a8:07:39:bd:ac:ad:d3:44 (RSA)
|   256 d7:b4:52:a2:c8:fa:b7:0e:d1:a8:d0:70:cd:6b:36:90 (ECDSA)
|_  256 df:f2:4f:77:33:44:d5:93:d7:79:17:45:5a:a1:36:8b (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.11, Linux 3.2 - 4.14
Network Distance: 4 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 81.61 seconds

┌──(kali㉿kali)-[~/Desktop/Blogger]
└─$ sudo nmap --script=vuln -p$ports -Pn 192.168.185.217
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-02 07:30 EDT
Nmap scan report for bogon (192.168.185.217)
Host is up (0.20s latency).

PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS


[09:06:19] Starting:
[09:06:26] 301 -  319B  - /images  ->  http://192.168.185.217/images/
[09:06:48] 301 -  319B  - /assets  ->  http://192.168.185.217/assets/
[09:07:01] 301 -  316B  - /css  ->  http://192.168.185.217/css/
[09:07:20] 301 -  315B  - /js  ->  http://192.168.185.217/js/

┌──(kali㉿kali)-[~/Desktop/Blogger]
└─$ whatweb http://192.168.185.217/
http://192.168.185.217/ [200 OK] Apache[2.4</
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

泷羽Sec-静安

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值