当前位置:网站首页>SSH key disclosure (module B competition topic) -- Application Service Vulnerability scanning and utilization
SSH key disclosure (module B competition topic) -- Application Service Vulnerability scanning and utilization
2022-06-30 00:13:00 【Shandong Wangan vegetable chicken】
There are problems, environment and analysis , I want a private letter , Not in vain !
Application Service Vulnerability scanning and utilization
1、 Use command nmap Detect the service version information of the target aircraft , Use the parameters you need as FLAG Submit ;
flag:sV
2、 Access the target system through the above port and detect hidden pages , Sensitive files that will be found 、 The directory name is used as FLAG( form :[ Sensitive files or directories 1, Sensitive files or directories 2…, Sensitive files or directories n]) Submit ;
flag:[ssh,robots,txt]
3、 Download the available private key and authentication keyword files through the above sensitive files or directories , Use the private key file name and the authentication keyword file name as FLAG( form :[ Private key filename , Authentication keyword file name ]) Submit ;
flag:[id_rsa,authorized_keys]
4、 Find the user name used to log in to the target server in the authentication keyword file , Use the user name as FLAG Submit ;
边栏推荐
- Solr基础操作14
- AI首席架构师9-胡晓光 《飞桨模型库与行业应用》
- Golang6 reflection
- QT learning 05 introduction to QT creator project
- Gradle serialization 7- configuration signature
- Analysis of define incdir command in TCL script of Modelsim
- Solr basic operations 15
- Solr基础操作11
- ThinkPad VMware installation virtual machine: this host supports Intel VT-x, but Intel VT-x is disabled (problem resolution)
- 利用 CertBot 申请 Let’s Encrypt SSL 证书
猜你喜欢

FPGA Development (2) -- IIC communication

Koa2 learning and using

Andorid source build/envsetup. SH details to know

云原生爱好者周刊:炫酷的 Grafana 监控面板集合

About mongodb error: connecting to: mongodb://127.0.0.1:27017/?compressors=disabled &gssapiServiceName=mongodb

6.29 problem solving

Teach you step by step to install webwind notes on edge browser
![复制带随机指针的链表[空间换时间--hash记录]](/img/d9/d81e0e4f81174c61275e4affe0777a.png)
复制带随机指针的链表[空间换时间--hash记录]

New CorelDRAW technical suite2022 latest detailed function introduction

蛇形矩阵(数组模拟方向, d代表转弯)
随机推荐
Solr基础操作12
Official website of Greentree
TP5查询AND和OR条件嵌套
Solr基础操作7
Majority element ii[molar voting method for finding modes]
New CorelDRAW technical suite2022 latest detailed function introduction
Clone undirected graph [bfs accesses each edge but not only nodes]
Label Troubleshooting: unable to open the marked image
Solr basic operations 13
Solr基础操作8
History of deep learning
云原生爱好者周刊:炫酷的 Grafana 监控面板集合
QT learning 04 Hello QT
koa2学习和使用
Exploration and Practice on the future direction of byte cloud database
Solr basic operations 9
QT learning 02 GUI program example analysis
8软件工程环境
QT learning 05 introduction to QT creator project
Binary search tree 230 The element with the smallest K in the binary search tree 1038 From binary search tree to larger sum tree


