Network Security Competition CTF Capture the Flag-Attack - Explanation of Attack and Defense of Windows Target Machine Vulnerabilities

This is a simple windows target drone of a C module. If you want this target drone, you can follow me, like, comment and forward, and then you can private message me to get it!

In the first step, we use nmap to scan what ports are open on the target machine

We can try the ftp21 port directly

It is found that the direct ftp login without user password is successful, you can check the flag

You can also use ms17-010 Eternal Blue to infiltrate successfully

You can also get the FLAG value directly, which is a simple windows target machine of the C module.

Guess you like

Origin blog.csdn.net/qq_50377269/article/details/130858106
Recommended