CTF之命令执行

练习环境

    攻击机:kali
    靶机:Ubuntu 17.04

1.发现靶机,进行端口扫描

root@afei:~# ifconfig eth0
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.3.150  netmask 255.255.255.0  broadcast 192.168.3.255
        inet6 fe80::a312:9449:dbee:1e8f  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:5b:f3:76  txqueuelen 1000  (Ethernet)
        RX packets 243732  bytes 240770752 (229.6 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1

猜你喜欢

转载自blog.csdn.net/qq_41490561/article/details/105183810
今日推荐