当前位置:网站首页>New Questions in Module B of Secondary Vocational Network Security Competition
New Questions in Module B of Secondary Vocational Network Security Competition
2022-08-04 07:32:00 【Wangzai Sec】
Environment private message blogger
Competition group: 421865857
Trojan information acquisition
Task environment description:
- Download 0077.pcap from the FTP of the target server, analyze the file, find out the protocol used by hackers, and submit the protocol name.
- Analyze the file, find out the zip archive file obtained by hackers, and submit the archive file name.
- Analyze the file, find out the sensitive files obtained by hackers, and submit the file name of the sensitive file
- Analyze the file, find out the sensitive file obtained by hackers, and submit the time when the sensitive file was leaked.
- Analyze the file, find out the sensitive file obtained by hackers, and submit the name of the leaked folder in the sensitive file.
Weak password blasting
1. Download 0064.py from the FTP of the target server, edit the Python program, make the program implement weak password blasting, and fill in the vacant F1 string in the file, generate a password list
2. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F2 string in the file, and fill in the connected host;
3. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F3 string in the file, and fill in the connection password;
4. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F4 string in the file, and write out the processing logic for connection failure /span> 5. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F5 string in the file, and write the processing logic for successful connection; 6. Edit the Python program 0064.py to make the program implement weak password blasting, fill in the vacant F6 string in the file, and write the value of the judgment result.Know if the blasting is successful; Encoding information acquisition redisUnauthorized accessp> 1.Download 0062.py from the FTP of the target server, edit the Python program, and make the program based onThe socket's redis is not authorized to identify, fill in the vacant F1 string in the file, and generate a socket object 2. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F2 string in the file, and connect to the target machine; 3. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F3 string in the file, and send the data; /span> 4. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F4 string in the file, and receive data 5. Edit the Python program 0062.py to implement socket-based redis unauthorized identification, fill in the vacant F5 string in the file, and close the connection object; 6. Edit the Python program 0062.py to enable the program to implement socket-based redis unauthorized identification, fill in the vacant F6 string in the file, and write if trueThe execution statement;
边栏推荐
猜你喜欢
随机推荐
Promise.all 使用方法
将回调函数转为Flow
如何画好业务架构图。
卷积神经网络CNN
Verilog“七宗罪”
开发小技巧 navicate如何点击单元格显示全部的文本内容或通过图像查看内容
JVM 快速检测死锁
MMDeploy部署实战系列【第二章】:mmdeploy安装及环境搭建
【并发】概念
简析强制缓存和协商缓存
MySQL面试题大全(陆续更新)
HbuilderX 启动微信小程序 无法打开项目
【selenium自动化】第四篇,结合testNg
ThreadLocal内存泄漏问题讲解
中职网络安全竞赛C模块MS17-010批量扫描
C语言指针
MySQL复制表结构、表数据的方法
LAN技术-3iStack
分布式计算实验2 线程池
Error EPERM operation not permitted, mkdir ‘Dsoftwarenodejsnode_cache_cacach两种解决办法