当前位置:网站首页>New Questions in Module B of Secondary Vocational Network Security Competition
New Questions in Module B of Secondary Vocational Network Security Competition
2022-08-04 07:32:00 【Wangzai Sec】
Environment private message blogger
Competition group: 421865857
Trojan information acquisition
Task environment description:
- Download 0077.pcap from the FTP of the target server, analyze the file, find out the protocol used by hackers, and submit the protocol name.
- Analyze the file, find out the zip archive file obtained by hackers, and submit the archive file name.
- Analyze the file, find out the sensitive files obtained by hackers, and submit the file name of the sensitive file
- Analyze the file, find out the sensitive file obtained by hackers, and submit the time when the sensitive file was leaked.
- Analyze the file, find out the sensitive file obtained by hackers, and submit the name of the leaked folder in the sensitive file.
Weak password blasting
1. Download 0064.py from the FTP of the target server, edit the Python program, make the program implement weak password blasting, and fill in the vacant F1 string in the file, generate a password list
2. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F2 string in the file, and fill in the connected host;
3. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F3 string in the file, and fill in the connection password;
4. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F4 string in the file, and write out the processing logic for connection failure /span> 5. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F5 string in the file, and write the processing logic for successful connection; 6. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F6 string in the file, and write the value of the judgment result.Know if the blasting is successful; Encoding information acquisition redisUnauthorized accessp> 1.Download 0062.py from the FTP of the target server, edit the Python program, and make the program based onThe socket's redis is not authorized to identify, fill in the vacant F1 string in the file, and generate a socket object 2. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F2 string in the file, and connect to the target machine; 3. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F3 string in the file, and send the data; /span> 4. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F4 string in the file, and receive data 5. Edit the Python program 0062.py to implement socket-based redis unauthorized identification, fill in the vacant F5 string in the file, and close the connection object; 6. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F6 string in the file, and write if trueThe execution statement;
边栏推荐
猜你喜欢
随机推荐
LAN技术-3iStack
IDEA 控制台 中文乱码问题(如果网上教程都无法解决你的问题的话)
likeshop外卖点餐系统开源啦100%开源无加密
从零开始单相在线式不间断电源(UPS)(硬件)
MATLAB版量化交易技术分析工具TA-Lib【不付费也可获取,不要被付费吓跑】
Error EPERM operation not permitted, mkdir ‘Dsoftwarenodejsnode_cache_cacach两种解决办法
七夕专属程序员的浪漫
MySQL复制表结构、表数据的方法
什么是多态。
【并发】概念
经典新诗九首
Redis非关系型数据库
设置el-table自动向下滑动(不多解释,直接代码实现)
TCP协议详解
拒绝碰运气,导师人品这样了解!
七夕情人节:中英文祝福短信送给你
Mac安装PHP开发环境
SQL去重的三种方法汇总
Activiti 工作流引擎 详解
两日总结六









