自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

hirak0的博客

信安小萌新

  • 博客(128)
  • 资源 (5)
  • 收藏
  • 关注

原创 靶机渗透练习99-hacksudo:FOG

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-fog,697/DescriptionThis box should be easy . This machine was created for the InfoSec Prep Discord Server (https://discord.gg/7ujQrt393b)The box was created with Virtualbox. Upon booting up use netdiscov

2022-05-12 09:45:00 5329

原创 靶机渗透练习98-hacksudo:L.P.E.

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-lpe,698/DescriptionBox created by hacksudo team members , mahesh pawar And Soham Deshmukh , vishal Waghmare .This box should be easy . This machine was created for the InfoSec Prep Discord Server (https:

2022-05-11 12:00:00 1502

原创 靶机渗透练习97-hacksudo:ProximaCentauri

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-proximacentauri,709/DescriptionBox created by hacksudo team members vishal Waghmare , Soham Deshmukh This box should be easy to medium . This machine was created for the InfoSec Prep Discord Server (http

2022-05-10 21:10:48 3136

原创 靶机渗透练习96-hacksudo:Thor

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-thor,733/DescriptionBox created by vishal Waghmare This box should be easy to medium . This machine was created for the InfoSec PrepDiscord Server ( https://discord.gg/kDyAKtJs ) Website (https://hacksud

2022-05-09 06:16:16 2027

原创 靶机渗透练习95-hacksudo:3

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-3,671/DescriptionThis box should be easy . This machine was created for the InfoSec Prep Discord Server (https://discord.gg/tsEQqDJh)The box was created with Virtualbox ,but it should work with VMWare P

2022-05-08 11:37:20 1877

原创 靶机渗透练习94-hacksudo:2 (HackDudo)

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-2-hackdudo,667/DescriptionN/AThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.3靶机:IP地址:192.168.9.13注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建如下

2022-05-07 09:52:53 1224

原创 靶机渗透练习93-hacksudo:1.0.1

靶机描述靶机地址:https://www.vulnhub.com/entry/hacksudo-101,650/DescriptionN/AThis works better with VirtualBox rather than VMware ## Changelog 2021-04-04 - v1.0.1 2021-02-22 - v1.0.0一、搭建靶机环境攻击机Kali:IP地址:192.168.9.3靶机:IP地址:192.168.9.12注:靶机与Kali的IP地

2022-05-06 00:06:25 3165

原创 靶机渗透练习92-Grotesque:3.0.1

靶机描述靶机地址:https://www.vulnhub.com/entry/grotesque-301,723/Descriptionget flags difficulty: mediumabout vm: tested and exported from virtualbox. dhcp and nested vtx/amdv enabled. you can contact me by email for troubleshooting or questions.This works

2022-05-04 08:00:00 1585

原创 靶机渗透练习91-Grotesque:2

靶机描述靶机地址:https://www.vulnhub.com/entry/grotesque-2,673/Descriptionget flagsdifficulty: mediumabout vm: do not touch ram allocation. vm needs 4gb of ram. tested and exported from virtualbox. dhcp and nested vtx/amdv enabled. you can contact me by em

2022-05-03 08:00:00 1440

原创 靶机渗透练习90-Grotesque:1.0.1

靶机描述靶机地址:https://www.vulnhub.com/entry/grotesque-101,658/Descriptionget flagsdifficulty: mediumabout vm: tested and exported from virtualbox. dhcp and nested vtx/amdv enabled. you can contact me by email for troubleshooting or questions.This works

2022-05-02 15:47:46 3261

原创 靶机渗透练习89-IA:Nemesis (1.0.1)

靶机描述靶机地址:https://www.vulnhub.com/entry/ia-nemesis-101,582/DescriptionDifficulty: Intermediate to HardGoal: Get the root shell and read all the 3 flags.Information: You need some good encryption and programming skills to root this box. Please solve t

2022-05-01 18:33:22 4436

原创 靶机渗透练习87-IA:Keyring (1.0.1)

靶机描述靶机地址:https://www.vulnhub.com/entry/ia-keyring-101,718/DescriptionDifficulty: IntermediateGoal: Get the root shell and read all the 2 flags.Information: No hints will be provided before 24 hours of the release. Try Harder!If you need any hints,

2022-04-30 10:00:00 2016

原创 靶机渗透练习86-HackathonCTF 2

靶机描述靶机地址:https://www.vulnhub.com/entry/hackathonctf-2,714/DescriptionDifficulty: EasyThis is a basic level BootToRoot machine for beginners. There are two flags. After finding the flag, tag me on Twitter(@Markme_1).一、搭建靶机环境攻击机Kali:IP地址:192.168.12

2022-04-29 15:19:58 792

原创 靶机渗透练习85-HackathonCTF 1

靶机描述靶机地址:https://www.vulnhub.com/entry/hackathonctf-1,591/DescriptionN/A一、搭建靶机环境攻击机Kali:IP地址:192.168.9.3靶机:IP地址:192.168.9.2注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建如下将下载好的靶机环境,导入 VritualBox,设置为 Host-Only 模式将 VMware 中桥接模式网卡设置

2022-04-28 10:00:00 1011

原创 靶机渗透练习84-The Planets:Earth

靶机描述靶机地址:https://www.vulnhub.com/entry/the-planets-earth,755/DescriptionDifficulty: EasyEarth is an easy box though you will likely find it more challenging than “Mercury” in this series and on the harder side of easy, depending on your experience.

2022-04-27 10:00:00 3389

原创 靶机渗透练习83-The Planets:Venus

靶机描述靶机地址:https://www.vulnhub.com/entry/the-planets-venus,705/DescriptionDifficulty: MediumVenus is a medium box requiring more knowledge than the previous box, “Mercury”, in this series. There are two flags on the box: a user and root flag which incl

2022-04-26 10:00:00 1665

原创 靶机渗透练习82-The Planets:Mercury

靶机描述靶机地址:https://www.vulnhub.com/entry/the-planets-mercury,544/DescriptionDifficulty: EasyMercury is an easier box, with no bruteforcing required. There are two flags on the box: a user and root flag which include an md5 hash. This has been tested o

2022-04-25 14:40:15 5475

原创 靶机渗透练习81-Momentum:2

靶机描述靶机地址:https://www.vulnhub.com/entry/momentum-2,702/DescriptionDifficulty : mediumKeywords : curl, bash, code reviewThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.79注:靶机与Kali的IP地址只

2022-04-24 10:32:15 1357

原创 靶机渗透练习80-Momentum:1

靶机描述靶机地址:https://www.vulnhub.com/entry/momentum-1,685/DescriptionInfo: easy / medium一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.78注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建如下将下载好的靶机环境,导入 VritualBox,设置为 Host-Only 模式将 VMw

2022-04-21 16:15:00 1694

原创 靶机渗透练习79-Venom

靶机描述靶机地址:https://www.vulnhub.com/entry/venom-1,701/DescriptionThis machine was created for the OSCP Preparation.This box was created with virtualbox. For any queries please contact me on twitter: @avi0813. Enumeration is the Key.一、搭建靶机环境攻击机Kali:

2022-04-21 16:00:00 3736 1

原创 靶机渗透练习78-Thoth Tech

靶机描述靶机地址:https://www.vulnhub.com/entry/thoth-tech-1,734/Descriptionn/aThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.76注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建如下将下载好的靶机

2022-04-21 15:45:00 740

原创 靶机渗透练习77-DC9

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-9,412/DescriptionDC-9 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.The ultimate goal of this challenge is to get root and to read the one a

2022-04-21 15:30:00 1207

原创 靶机渗透练习76-DC8

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-8,367/DescriptionDC-8 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.This challenge is a bit of a hybrid between being an actual challenge,

2022-04-21 15:15:00 960

原创 靶机渗透练习75-DC7

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-7,356/DescriptionDC-7 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.While this isn’t an overly technical challenge, it isn’t exactly easy.W

2022-04-21 15:00:00 1043

原创 靶机渗透练习74-DC6

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-6,315/DescriptionDC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.This isn’t an overly difficult challenge so should be great for beginner

2022-04-21 14:45:00 916

原创 靶机渗透练习73-DC5

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-5,314/DescriptionDC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.The plan was for DC-5 to kick it up a notch, so this might not be great

2022-04-21 14:30:00 1072

原创 靶机渗透练习72-DC4

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-4,313/DescriptionDC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.Unlike the previous DC releases, this one is designed primarily for beg

2022-04-21 14:15:00 2544

原创 靶机渗透练习71-DC3

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-32,312/DescriptionDC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.As with the previous DC releases, this one is designed with beginners i

2022-04-21 14:00:00 1425

原创 靶机渗透练习70-DC2

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-2,311/DescriptionMuch like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.As with the original DC-1, it’s designed with beginners

2022-04-21 13:45:00 928

原创 靶机渗透练习69-DC1

靶机描述靶机地址:http://www.vulnhub.com/entry/dc-1,292/DescriptionDC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.It was designed to be a challenge for beginners, but just how easy it is will

2022-04-21 13:30:00 1910

原创 靶机渗透练习68-Ripper

靶机描述靶机地址:https://www.vulnhub.com/entry/ripper-1,706/DescriptionThis is a vulnerable linux box focused on web application testing along with showing the importance of enumeration. There are three users you needs to compromise to read the root flag.Di

2022-04-20 15:45:00 693

原创 靶机渗透练习67-Looz

靶机描述靶机地址:https://www.vulnhub.com/entry/looz-1,732/DescriptionNot that hard and not that easy, it’s always straightforward if you can imagine it inside your mind.If you need any help you can find me on Twitter @mhz_cyber , and I will be happy to read

2022-04-20 15:30:00 1032

原创 靶机渗透练习66-ICA

靶机描述靶机地址:https://www.vulnhub.com/entry/ica-1,748/DescriptionAccording to information from our intelligence network, ICA is working on a secret project. We need to find out what the project is. Once you have the access information, send them to us. We

2022-04-20 15:15:00 1049

原创 靶机渗透练习65-Hms?

靶机描述靶机地址:https://www.vulnhub.com/entry/hms-1,728/DescriptioneasyThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.63注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建如下将下载好的靶机环境,导入

2022-04-20 15:00:00 926

原创 靶机渗透练习64-EvilBox:One

靶机描述靶机地址:https://www.vulnhub.com/entry/evilbox-one,736/DescriptionDifficulty: EasyThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.62注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭建

2022-04-20 14:45:00 2630

原创 靶机渗透练习63-doubletrouble

靶机描述靶机地址:https://www.vulnhub.com/entry/doubletrouble-1,743/Descriptionget flagsdifficulty: easyabout vm: tested and exported from virtualbox. dhcp and nested vtx/amdv enabled. you can contact me by email for troubleshooting or questions.This works

2022-04-20 14:30:00 4754

原创 靶机渗透练习62-Coffee Addicts

靶机描述靶机地址:https://www.vulnhub.com/entry/coffee-addicts-1,699/DescriptionOur coffee shop has been hacked!! can you fix the damage and find who did it?This works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:19

2022-04-20 14:15:00 4866

原创 靶机渗透练习61-Chronos

靶机描述靶机地址:https://www.vulnhub.com/entry/chronos-1,735/DescriptionDifficulty : mediumThis works better with VirtualBox rather than VMware一、搭建靶机环境攻击机Kali:IP地址:192.168.9.7靶机:IP地址:192.168.9.58注:靶机与Kali的IP地址只需要在同一局域网即可(同一个网段,即两虚拟机处于同一网络模式)该靶机环境搭

2022-04-20 14:00:00 2143 2

原创 靶机渗透练习60-digitalworld.local:FALL

靶机描述靶机地址:https://www.vulnhub.com/entry/digitalworldlocal-fall,726/DescriptionTo celebrate the fifth year that the author has survived his infosec career, a new box has been born! This machine resembles a few different machines in the PEN-200 environm

2022-04-20 13:45:00 2406

原创 计算机网络回顾之计算机网络概述

第一章 概述1.1 计算机网络在信息时代中的作用21世纪的3个重要特征—以网络为核心的信息时代数字化,信息化,网络化三大类网络—电信网络,有线电视网络,计算机网络。电信网络:提供电话、电报、传真等服务。有线电视网络:向用户传送各种电视节目。计算机网络:使用户能够在计算机之间传送数据文件。计网处于三网中处于核心地位,也是本书讨论的内容。互联网的两个基本特点:连通性:上网的用户可以不受距离的限制交换各种信息(数据,以及各种音频视频),就像直接连通一样(相较于传统的电信网)。共享:就

2022-04-20 09:28:14 1462

Yaazhini 2.0.2(Android APK和API漏洞扫描器)

1、 一键即可扫描Android APK文件; 2、 支持扫描Android端应用程序REST API(模拟器或实体设备); 3、 生成格式化扫描报告; 4、 免费使用; 5、 操作简单,界面友好; 使用步骤: 1、 开启Yaazhini应用程序; 2、 输入项目名称; 3、 上传需要扫描的APK文件; 4、 点击“Upload & Scan”(上传&扫描)按钮; 5、 扫描完成之后,我们将会查看到漏洞扫描详细报告; Yaazhini-Android端应用程序REST API扫描功能可以帮助我们发现和识别下列攻击形式: 1、 SQL注入 2、 命令注入 3、 Header注入 4、 跨站脚本XSS 5、 安全Header缺失 6、 响应Header中的敏感信息泄露 7、 错误信息中的敏感信息泄露 8、 服务器端输入验证缺失 9、 禁止使用的HTTP方法 10、不正确的HTTP响应等等

2022-05-03

VM清理工具--卸载残留/删除注册表

VM清理工具--卸载残留/删除注册表

2021-05-13

python-3.9.5-amd64.exe

python-3.9.5-amd64.exe

2021-05-13

VSCodeUserSetup-x64-1.56.1.exe

Windows最新版--VSCodeUserSetup-x64-1.56.1.exe

2021-05-13

御剑端口扫描最新.zip

方便查找用户后台登陆地址,同时也为程序开发人员增加了难度,尽量独特的后台目录结构。 很强大的字典。

2020-09-18

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除