当前位置:网站首页>SSH key disclosure (module B competition topic) -- Application Service Vulnerability scanning and utilization
SSH key disclosure (module B competition topic) -- Application Service Vulnerability scanning and utilization
2022-06-30 00:13:00 【Shandong Wangan vegetable chicken】
There are problems, environment and analysis , I want a private letter , Not in vain !
Application Service Vulnerability scanning and utilization
1、 Use command nmap Detect the service version information of the target aircraft , Use the parameters you need as FLAG Submit ;
flag:sV
2、 Access the target system through the above port and detect hidden pages , Sensitive files that will be found 、 The directory name is used as FLAG( form :[ Sensitive files or directories 1, Sensitive files or directories 2…, Sensitive files or directories n]) Submit ;
flag:[ssh,robots,txt]
3、 Download the available private key and authentication keyword files through the above sensitive files or directories , Use the private key file name and the authentication keyword file name as FLAG( form :[ Private key filename , Authentication keyword file name ]) Submit ;
flag:[id_rsa,authorized_keys]
4、 Find the user name used to log in to the target server in the authentication keyword file , Use the user name as FLAG Submit ;
边栏推荐
- 西门子低代码 9.14版本: 满足不同需求
- [advanced C language] file operation (II)
- js中的事件
- 【毕业季|进击的技术er】工作七年的职场人,不希望你们再走弯路
- Virtual machine online migration based on openstack
- Exploration and Practice on the future direction of byte cloud database
- Table responsive layout tips for super nice
- Shell operator
- AI chief architect 9- huxiaoguang, propeller model library and industry application
- Solr基础操作15
猜你喜欢

Zhongang Mining: Fluorite helps the construction and development of lithium battery in fluorine industry

MySQL multi table query

一步步教你在Edge浏览器上安装网风笔记

云原生爱好者周刊:炫酷的 Grafana 监控面板集合

西门子低代码 9.14版本: 满足不同需求

JS绘制极坐标颜色渐变

6.29 problem solving

Project 1: deploy lamp ECSHOP e-commerce platform
![[Shangshui Shuo series] day 8](/img/66/2aaa82f122612db1775bdd45556d97.png)
[Shangshui Shuo series] day 8

Preliminary syntax of JS
随机推荐
蛇形矩阵(数组模拟方向, d代表转弯)
Shell operator
[advanced C language] string and memory function (I)
Unity about failure (delay) of destroy and ondestroy
gyctf_2020_document
500 error occurred after importing skins folder into solo blog skin
复制带随机指针的链表[空间换时间--hash记录]
Solr basic operations 9
Solr基础操作15
label问题排查:打不开标注好的图像
旋转彩色三叶草
6.28 problem solving
Mysql:sql overview and database system introduction | dark horse programmer
Embedded development: Hardware in the loop testing
【UITableView】坑一:tableView:heightForHeaderInSection:方法不执行
Color space conversion in video tonemapping (HDR to SDR) (bt2020 to bt709, YCbCr, YUV and RGB)
How to write controller layer code gracefully?
Solr基础操作6
koa2学习和使用
What is flush software? Is it safe to open an account online?


