2022 Network Security Skills Competition SSH Weak Password Penetration Test Analysis (Secondary Vocational Group)

SSH weak password penetration test
task environment description:

  • Server Scenario: Linux (close link)
  • Server scenario operating system: Linux (unknown version)
  1. In the local PC penetration testing platform BT5, use the zenmap tool to scan the surviving host IP addresses and designated open ports 21, 22, and 23 within the network segment where Linux is located in the server scenario (for example: 172.16.101.0/24). And submit the string that must be added in the command used by this operation as FLAG (ignore the ip address); flag: -p 21,22,23

2. Use the penetration testing platform BT5 in the local PC to perform system service and version scanning penetration testing on server scenario Linux, and submit the service port information corresponding to the SSH service in the operation display results as FLAG;

 

FLAG:22/tcp

3. Use the MSF module to blast it in the local PC penetration testing platform BT5, use the search command, and submit the name information of the weak password scanning module as FLAG;

 

FLAG:auxiliary/scanner/ssh

Guess you like

Origin blog.csdn.net/weixin_57099902/article/details/130483460