Machine can be download here.Nmap scan ports.Brutefoce port 80.Go on bruteforce in /brainstorm.wfuzz -w /usr/share/wfuzz/wordlist/general/common.txt --hh 0 'http://192.168.56.54/brainstorm/file.php?FUZZ=/etc/passwd&
Machines can be download here.Nmap scan ports.Gobuster scan files and folders.Visit main page, get chat window.Visit chat.txt, chat history is here.Visit administration.php, get error.There should be some parameter for administration.php.wfuzz -
Medium level, machine can be download here.Nmap scan ports, only 5000 is open.Gobuster scan folders and files with medium dic.gobuster dir -u http://192.168.56.48:5000 -t 50 -x .php,.html,.txt -w /usr/shar
Machines can be download here. Easy but also interesting one.Nmap scan ports, only 80 is open.Open main page, very simple.Check source code, found locker.php.Click "Model 1", then redirect to locker.php and display a picture.Obviously, the
(Tips:LFI through alias, SQL Trunction Attack, Blind RCE, NPM to shell,Caesar Cipher)Very interesting and hard (in my opnion) VM. Can be download here. It's my first time playing a machine with lots of new stuff, so I write this walkthrough for l
Another very interesting VM from HackMyVm, can be download here.Nmap scan ports.At port 80, there is a static html page. Bruteforce the folders and files.There is a squirrelmail site, but we can not login now.After stuck here for some time, we
Machines can be download here.Nmap scan ports first.Start from 21 port. Log in ftp as anonymous user, and download all the three files.Here's note.txt.Check the structure.PNG, which show us the working theory of the jar program. That means we can
A very interesting CTF VM from HackMyVm, can be download here.nmap ports scan.At 80 port, index.html has useful message.Wireshark capture file has extension: pacp. Add it to the folder/file brutefore options.gobuster dir -u http://192.
靶机下载地址是:https://hackmyvm.eu/machines/machine.php?vm=Hacked。简略叙述过程。加载后扫描目录,只有robots.txt文件。加载后提示有个secretnote.txt文件。根据提示,有webshell。但是一般的字典扫不到,需要在SecList里找到和后门有关的字典,可以找到simple-backdoor.php。curl加载测试,提示参数被修改了,且会马上跳转回主页。burpsuite抓包后,对get的参数进行FUZZ,得到正确的参数名称。
(英语写几篇,便于国际友人搜索浏览。都是简单句,国内的同学看着应该也不太费劲。)A very tricky VM, level is hard, can be download here.First, use nmap to scan ports.Gobuser to bruteforce folders and files at port 80, found nothing.There's only one image at index.html.Download and extrac