2014-06-12 日志

作者即将开始新的学习旅程,需要完成交学费和找到教室的任务。虽然对教室条件感到失望,但对即将到来的学习仍充满期待。

两件事,第一交全学费;第二找到教室。

教室在新都有个叫博科学校的,看简介很牛X,培养了万余名SAP硕士。跑题了,教室真叫一个简单,一排连着的桌子,积满了灰尘。也没有抽屉,书包只能扔地上。网线倒是挺全,每个桌子一根。电脑应该是还没配套,反正自带本,有插座就行了。教室有点闷,不知道有没有空调啊,还是朝阳的教室啊,这三伏不得一锅闷了啊?

班主任倒是挺年轻的,武鑫,反正官网上没有介绍,应该苦等上位。这一期至少80人,90左右吧。

明天8:30开学典礼,唉,又要起早了。

root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker-compose down [+] Running 0/1 [+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping0[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping2[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping3[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping4[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping5[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping6[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping7[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping8[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping9[+] Running 0/1shellshockcve-2014-6271-web-1 Stopping1[+] Running 1/2shellshockcve-2014-6271-web-1 Stopping1 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10[+] Running 1/2 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10[+] Running 2/2 ✔ Container 12shellshockcve-2014-6271-web-1 Removed10.2s ✔ Network 12shellshockcve-2014-6271_default Removed0.1s root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker-compose up -d [+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 1/2 ✔ Network 12shellshockcve-2014-6271_default Created0.[+] Running 2/2 ✔ Network 12shellshockcve-2014-6271_default Created0.1s ✔ Container 12shellshockcve-2014-6271-web-1 Started0.3s root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# docker exec -it 12shellshockcve-2014-6271-web-1 ps aux | grep apache root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)# \curl --noproxy '*' -v http://127.0.0.1/cgi-bin/victim.cgi * Trying 127.0.0.1:80... * Connected to 127.0.0.1 (127.0.0.1) port 80 (#0) > GET /cgi-bin/victim.cgi HTTP/1.1 > Host: 127.0.0.1 > User-Agent: curl/7.81.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 404 Not Found < Date: Mon, 01 Dec 2025 06:45:33 GMT < Server: Apache/2.4.10 (Debian) < Content-Length: 291 < Content-Type: text/html; charset=iso-8859-1 < <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /cgi-bin/victim.cgi was not found on this server.</p> <hr> <address>Apache/2.4.10 (Debian) Server at 127.0.0.1 Port 80</address> </body></html> * Connection #0 to host 127.0.0.1 left intact root@zzz-virtual-machine:/home/11/Chapter4/实战12 Shell shock 漏洞(CVE-2014-6271)#
最新发布
12-02
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值