Task 2: Scan penetration test (50 points) [2019 information security management and evaluation contest problems answer -01]

Tasking environment Description:

Attack:

  • Physical machine: Windows7
    • Physical installation tool 1: Microsoft Visual Studio 2008
    • Physical installation tool 2: OllyICE
  • Virtual Machine 1: Ubuntu_Linux
    • Virtual Machine 1 installation tool 1: Python3 / Python2
    • 1 virtual machine installation tools 2: GCC
    • 1 virtual machine installation tools 3: GDB
    • 1 virtual machine installation tools 4: Netcat
    • 1 virtual machine username: root, password Virtual Machine 1: 123456
  • Virtual machine operating system 2: CentOS_Linux
    • 2 virtual machine installation tool 1: GCC
    • 2 virtual machine installation tools 2: GDB
    • Virtual Machine 2 Username: root, VM 2 Password: 123456

target drone:

  • Server Scenario 1: WindowsServer
    • FTP server scenario 1 download service user name: anonymous
  • Server Scenario 2: Windows (unknown)

##########################################

### in accordance with previous years, on the scan script ARP, ICMP ###

##########################################


 SUMMARY:

1. Scenario 2 server for uploading a word Trojan, use a file that contains the directory that contains the URL of the relevant documents, web pages, parameter string as a parameter, a hexadecimal value by the result of the hash function MD5 operations returned as the value of Flag submitted (in the form of: hexadecimal string);

js/calendar.php?lang=

The above information is hashed (equal sign), 19 years National Cup first task two small questions the answer is this. The vulnerability is ecshop, refer to: https://www.seebug.org/vuldb/ssvid-26135

2. In the Disk C 2 server scenario: finding \ under Windows ABC_03.py file, upload it to a virtual machine 1 attack aircraft, according to comments within the required functional script file, in perfect script code, would require a corresponding FLAG1 sound content string as a parameter by the MD5 function operation, the hexadecimal value returned result of the hash value as the submission Flag (form: hexadecimal string);

 

3. Continue editing ABC_03.py file, in perfect script code, will FLAG2 the corresponding need to improve the content string as a parameter, hexadecimal results after MD5 hash function operation return value as the value of Flag submitted (in the form of: hexadecimal string);

 

4. ABC_03.py continue editing documents in improving script code, the need to improve the content of the corresponding FLAG3 string as a parameter, the results hexadecimal MD5 hash function operation returns the value as the value submitted Flag (in the form of: hexadecimal string);

 

5. Continue ABC_03.py edit files in perfect script code, the need to improve the content of the corresponding FLAG4 string as a parameter, the results hexadecimal MD5 hash function operation returns the value as the value submitted Flag (in the form of: hexadecimal string);

 

6. Continue editing ABC_03.py file, in perfect script code, will FLAG5 the corresponding need to improve the content string as a parameter, hexadecimal results after MD5 hash function operation return value as the value of Flag submitted (in the form of: hexadecimal string);

 

7. Continue editing ABC_03.py file, in perfect script code, will FLAG6 the corresponding need to improve the content string as a parameter, hexadecimal results after MD5 hash function operation return value as the value of Flag submitted (in the form of: hexadecimal string);

 

8. Continue ABC_03.py edit files in perfect script code, the need to improve the content of the corresponding FLAG7 string as a parameter, the results hexadecimal MD5 hash function operation returns the value as the value submitted Flag (in the form of: hexadecimal string);

 

9. ABC_03.py continue editing files, script code in improving, the need to improve the content of the corresponding FLAG8 string as a parameter, the results hexadecimal MD5 hash function operation returns the value as the value submitted Flag (in the form of: hexadecimal string);

 

Virtual machine 10. The machine 1 in which the attack execution script ABC_03.py, according to the echo server scene scan output port 2 as a parameter string, a hexadecimal value by the result of the hash function MD5 calculation returns Flag value as filed (form: hexadecimal string);

 Scan in several ways:

 

If you find this article useful to you you can be a reward by scanning the QR code below.

-> micro letter <             - -> Alipay < -

 

Guess you like

Origin www.cnblogs.com/nul1/p/11122381.html