HackMyVm Tom Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=TomKey points: tomcat configuration and uploadScan ports. ~ nmap -sV -sC -p- -Pn 192.168.56.100 -oN ports.log
HackMyVm Hat Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=HatKey points: IPv6Nmap scan ports. nmap -sV -sC -p- -Pn -oN ports.log 192.168.56.100 Nmap scan report for deathnote.vuln (192.168.56.100) Host is up (0.0012s latency)
HackMyVm Tranquil Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=TranquilKey points: multi service on one port, gshadow.Scan ports, only 21 is open, and anonymous login, very strange. nmap -sV -sC -p- -oN ports.log 192.168.56.100&n
之前用python做了个命令行的爬虫,在安卓上运行时还得打开termux,用上虚拟键盘,很不方便,于是一直想改为Android版本的。近期刚发现Kivy/KivyMD可以基于Python进行跨平台开发,国庆期间进行了尝试。在此记录一些踩坑经历,供有相同需求的同学参考。一、解决中文乱码问题Kivy和KivyMD原生不支持中文,采用的默认字体是英文字体,直接运行起来就会显示方框。Kivy中可以通过设置LabelBase修改字体,但是每一个控件都要在代码中增加font_style的定义,非常不方便。而
HackMyVm Drippingblues Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=DrippingbluesScan ports. nmap -sV -sC -p- -oN ports.log 192.168.56.100 PORT STATE SERVICE VERSION&n
HackMyVm Demons Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=DemonsFind IP of the machine. ~ sudo arp-scan --interface eth1 192.168.56.0/24 &nbs
Vulnhub DoubleTrouble Walkthroughhttps://www.vulnhub.com/entry/doubletrouble-1,743/Scan port 80. ~ gobuster dir -u http://192.168.56.100 -t 50 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x .html,.php,.txt,.php.ba
HackMyVm Dance Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=DanceScan ports first. nmap -sV -sC -p- -oN ports.log 192.168.56.100 ... PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 
Vulnhub Deathnote: 1 Walkthroughhttps://www.vulnhub.com/entry/deathnote-1,739/](https://www.vulnhub.com/entry/deathnote-1,739/Easy one, key steps here.Get notes.txt and user.txt from http://deathnote.vuln/wordpress/wp-content/uploads/2021/07/.Hydra s
HackMyVm Hacker kid: 1.0.1 Walkthroughhttps://www.vulnhub.com/entry/hacker-kid-101,719/Very good machine, learn some new stuff.Scan ports, port 53 is interesting. nmap -sV -sC -p- 192.168.33.144 -oN ports.log &nb