当前位置:网站首页>Network security of secondary vocational group 2021 Jiangsu provincial competition 5 sets of topics environment + analysis of all necessary private messages I
Network security of secondary vocational group 2021 Jiangsu provincial competition 5 sets of topics environment + analysis of all necessary private messages I
2022-07-05 10:43:00 【ruihack】
2021 The title of Jiangsu provincial competition 5 Set the topic environment all the private messages I need , If you have any questions, welcome to discuss with bloggers
Task a : Attack log analysis
pit 1. Port does not count as port
2. Orders are not orders
3. Or tell you through the topic ?
1. From the target server FTP Upload and download attack.pcapng Package file , By analyzing the data package attack.pcapng, Find the hacker's IP Address , And put the hacker's IP Address as FLAG( form :[IP Address ]) Submit ;(1 branch )
192.168.10.106
2. Continue to view the package file attack.pacapng, Analyze the open port of the target scanned by the hacker , Use the open port of the target as FLAG( form :[ Port name 1, Port name 2, Port name 3…, Port name n]) From low to high ;(1 branch )
21/22/23/80/139/445/3306/8080/15629/37113/42838/44500/54351/56436
3. Continue to view the package file attack.pacapng, Analyze the version number of the operating system obtained after the hacker's successful intrusion , Take the version number of the operating system as FLAG( form :[ Operating system version number ]) Submit ;(1 branch )
Linux localhost.localdomain 2.6.32-504.el6.i686
4. Continue to view the package file attack.pacapng, Analyze the first command executed by the hacker after successful intrusion , And take the first command executed as FLAG( form :[ The first order ]) Submit ;(1 branch )
id
5. Continue to view the package file attack.pacapng, Analyze the second command executed by the hacker after successful intrusion , And execute the second command as FLAG( form :[ The second order ]) Submit ;(2 branch )
uname -a
6. Continue to view the package file attack.pacapng, Analyze the return result of the second command executed by the hacker after successful intrusion , And return the result of the second command as FLAG( form :[ The second command returns the result ]) Submit ;(2 branch )
Linux localhost.localdomain 2.6.32-504.el6.i686 #1 SMP Wed Oct 15 03:02:07 UTC 2014 i686 i686 i386 GNU/Linux
7. Continue to view the package file attack.pacapng, Analyze the return result of the third command executed after the hacker's successful intrusion , And return the result of the third command as FLAG( form :[ The third command returns the result ]) Submit .(2 branch )
/
Task 2 : System vulnerability exploitation and right raising
1. Use nmap Scanning target system , Take the open port number of the target aircraft in the order from small to large FLAG( form :[ port 1, port 2…, port n]) Submit ;(1 branch )
21,22,80
2. Access the target system through the above port , Log in with a weak password , Use the correct user name and password as FLAG( form :[ user name , password ]) Submit ;(1 branch )
3. utilize Kali The penetration machine generates a rebound Trojan horse , Take the first word of the fourth line prompted after the execution of the generated Trojan command as FLAG( form :[ word ]) Submit ;(1 branch )
4. Modify the above Trojan file and upload it to the target system , Use MSF Turn on monitoring , Take the user name of the current permission obtained as FLAG( form :[ user name ]) Submit ;(1 branch )
5. Check the system kernel version information , Take the system kernel version number as FLAG( form :[ Version number ]) Submit ;(1 branch )
6. stay Kali Find the exploitable source code in the attacker , Take the file name of the found vulnerability source code as FLAG( form :[ file name ]) Submit ;(1 branch )
7. The target obtained by using the above vulnerability source code /root The only one in the world .txt The file name of the file is FLAG( form :[ file name ]) Submit ;(1 branch )(2 branch )
8. After using the above vulnerability source code, the target will be obtained /root The only one in the world .txt The contents of the document are used as FLAG( form :[ The contents of the document ]) Submit .(2 branch )
Task three : Code audit
1. In infiltration machine Kali Linux Access the target server Web page , Register your account and log in , Find the existence XSS Execute the vulnerable page , Will exist in this page XSS The object name of the execution vulnerability is as FLAG Submit ;(2 branch )
2. structure Cookie rebound JS Script , Will be JS The objects and methods used in the code act as FLAG( form : object . Method ) Submit ;(2 branch )
3. In infiltration machine Kali Linux Restart in Web service , Use the restart command as FLAG Submit ;(2 branch )
Use the original... In the target server XSS Vulnerability calls the above JS Script , In infiltration machine Kali Linux In the open 3333 Port listening , Use the command to open port listening as FLAG Submit ;(2 branch )
4. In infiltration machine Kali Linux In the open 3333 Port listening , Take the first word in the first line of the response received after opening the port listening as FLAG Submit ;(2 branch )
5. In infiltration machine Kali Linux In the open 3333 Port listening , Take the last word in the fifth line of the response received after opening the port listening as FLAG Submit .(2 branch )
Task 4 :Web Safety penetration test
1. Access... Through a browser http:// Target server IP/1, Perform a penetration test on the page , find flag Format :flag{Xxxx123}, The contents in parentheses are used as flag Value and submit ;(2 branch )
2. Access... Through a browser http:// Target server IP/2, Perform a penetration test on the page , find flag Format :flag{Xxxx123}, The contents in parentheses are used as flag Value and submit ;(2 branch )
3. Access... Through a browser http:// Target server IP/3, Perform a penetration test on the page , find flag Format :flag{Xxxx123}, The contents in parentheses are used as flag Value and submit ;(2 branch )
4. Access... Through a browser http:// Target server IP/4, Perform a penetration test on the page , find flag Format :flag{Xxxx123}, The contents in parentheses are used as flag Value and submit ;(3 branch )
5. Access... Through a browser http:// Target server IP/5, Perform a penetration test on the page , find flag Format :flag{Xxxx123}, The contents in parentheses are used as flag Value and submit .(3 branch )
Task five :Linux Operating system penetration test
1. Through the infiltration machine Kali Perform system service and version scanning penetration test on the target server , And display the operation in the result 21 The service version information string corresponding to the port is used as Flag Value submission ;(1 branch )
2. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /var/www The only suffix in the directory is .bmp The file name of the file is used as Flag Value submission ;(1 branch )
3. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /var/www The only suffix in the directory is .bmp The English words in the picture file are used as Flag Value submission ;(1 branch )
4. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /home/guest The only suffix in the directory is .pdf The file name of the file is used as Flag Value submission ;(1 branch )
5. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /home/guest The only suffix in the directory is .pdf The contents of the document are used as Flag Value submission ;(2 branch )
6. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /var/vsftpd The only suffix in the directory is .docx The file name of the file is used as Flag Value submission ;(1 branch )
7. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /var/vsftpd The only suffix in the directory is .docx The contents of the document are used as Flag Value submission ;(2 branch )
8. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /root The only suffix in the directory is .txt The file name of the file is used as Flag Value submission ;(1 branch )
9. Through the infiltration machine Kali Conduct penetration test on the target server , Put the scene /root The only suffix in the directory is .txt The contents of the document are used as Flag Value submission .(2 branch )
Task six : Port scanning Python Penetration test
1. From the target server FTP Upload and download PortScan.py, edit Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F1 character string , Take this string as Flag Value submission ;(1 branch )
2. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F2 character string , Take this string as Flag Value submission ;(1 branch )
3. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F3 character string , Take this string as Flag Value submission ;(1 branch )
4. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F4 character string , Take this string as Flag Value submission ;(1 branch )
5. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F5 character string , Take this string as Flag Value submission ;(1 branch )
6. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F6 character string , Take this string as Flag Value submission ;(1 branch )
7. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F7 character string , Take this string as Flag Value submission ;(1 branch )
8. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F8 character string , Take this string as Flag Value submission ;(1 branch )
9. continue editing Python Program PortScan.py, Implementation is based on TCP Full open port scanning , Fill in the blanks in this document F9 character string , Take this string as Flag Value submission ;(1 branch )
边栏推荐
- 2021年山东省赛题库题目抓包
- 谈谈对Flink框架中容错机制及状态的一致性的理解
- Solution to the length of flex4 and Flex3 combox drop-down box
- Today in history: the first e-book came out; The inventor of magnetic stripe card was born; The pioneer of handheld computer was born
- Solution of ellipsis when pytorch outputs tensor (output tensor completely)
- 第五届 Polkadot Hackathon 创业大赛全程回顾,获胜项目揭秘!
- Learning notes 5 - high precision map solution
- [observation] with the rise of the "independent station" model of cross-border e-commerce, how to seize the next dividend explosion era?
- GO项目实战 — Gorm格式化时间字段
- 九度 1480:最大上升子序列和(动态规划思想求最值)
猜你喜欢
DGL中异构图的一些理解以及异构图卷积HeteroGraphConv的用法
Today in history: the first e-book came out; The inventor of magnetic stripe card was born; The pioneer of handheld computer was born
Go-3-第一个Go程序
“军备竞赛”时期的对比学习
5G NR系统架构
Apple 5g chip research and development failure? It's too early to get rid of Qualcomm
Web3基金会「Grant计划」赋能开发者,盘点四大成功项目
How to write high-quality code?
Learning II of workmanager
SAP ui5 objectpagelayout control usage sharing
随机推荐
Secteur non technique, comment participer à devops?
SAP ui5 objectpagelayout control usage sharing
Who is the "conscience" domestic brand?
分享.NET 轻量级的ORM
Timed disappearance pop-up
Activity enter exit animation
Ad20 make logo
变量///
使用GBase 8c数据库过程中报错:80000502,Cluster:%s is busy,是怎么回事?
DGL中异构图的一些理解以及异构图卷积HeteroGraphConv的用法
请问postgresql cdc 怎么设置单独的增量模式呀,debezium.snapshot.mo
字符串、、
In the year of "mutual entanglement" of mobile phone manufacturers, the "machine sea tactics" failed, and the "slow pace" playing method rose
Learning notes 5 - high precision map solution
脚手架开发进阶
数组、、、
Go语言-1-开发环境配置
2022年化工自动化控制仪表考试试题及在线模拟考试
重磅:国产IDE发布,由阿里研发,完全开源!
vite//