vulnhub靶机实战_DC-5

本文涉及的产品
多模态交互后付费免费试用,全链路、全Agent
简介: 本教程介绍如何下载并配置DC-5靶机进行安全测试。内容包括靶机下载链接、VMware导入步骤、网络设置及Nmap扫描分析,帮助快速搭建渗透测试环境。

下载

  1. 靶机下载链接汇总:https://download.vulnhub.com/
  2. 使用搜索功能,搜索dc类型的靶机即可。
  3. 本次实战使用的靶机是:DC-5
  4. 系统:Debian
  5. 下载链接:https://download.vulnhub.com/dc/DC-5.zip

启动

  1. 下载完成后,打开VMware软件,通过左上角文件打开,将ova文件导入,导入完成后将网络连接方式修改为NAT。
  2. 启动成功图

扫描分析

  1. 本次实践ip网段为:192.168.198.0/24 攻击机IP为:192.168.198.129
  2. 未启动靶机扫描网段
nmap -sP 192.168.198.0/24
# 结果
# Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-06 14:10 CST
# Nmap scan report for 192.168.198.1
# Host is up (0.00020s latency).
# MAC Address: 00:50:56:C0:00:08 (VMware)
# Nmap scan report for 192.168.198.2
# Host is up (0.00020s latency).
# MAC Address: 00:50:56:F7:F2:9C (VMware)
# Nmap scan report for 192.168.198.254
# Host is up (0.00012s latency).
# MAC Address: 00:50:56:E7:6F:81 (VMware)
# Nmap scan report for 192.168.198.129
# Host is up.
# Nmap done: 256 IP addresses (4 hosts up) scanned in 2.03 seconds
  1. 启动靶机扫描网段
  1. 得到靶机IP:192.168.198.134
nmap -sP 192.168.198.0/24
# 结果
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-06 14:11 CST
Nmap scan report for 192.168.198.1
Host is up (0.00018s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.198.2
Host is up (0.00017s latency).
MAC Address: 00:50:56:F7:F2:9C (VMware)
Nmap scan report for 192.168.198.134
Host is up (0.00022s latency).
MAC Address: 00:0C:29:CD:6E:79 (VMware)
Nmap scan report for 192.168.198.254
Host is up (0.00017s latency).
MAC Address: 00:50:56:E7:6F:81 (VMware)
Nmap scan report for 192.168.198.129
Host is up.
Nmap done: 256 IP addresses (5 hosts up) scanned in 1.92 seconds
┌──(root㉿kali)-[/home/varin]
  1. 扫描靶机基本信息
  1. 开放端口:111 、80、33830
  2. 开放服务:http
  3. 中间件服务:nginx/1.6.2
nmap -A -v -p 1-65535 -T4  --script=vuln 192.168.198.134
 
# 结果
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-06 14:13 CST
NSE: Loaded 150 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:13
NSE Timing: About 50.00% done; ETC: 14:14 (0:00:31 remaining)
Completed NSE at 14:13, 34.02s elapsed
Initiating NSE at 14:13
Completed NSE at 14:13, 0.00s elapsed
Pre-scan script results:
| broadcast-avahi-dos:
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Initiating ARP Ping Scan at 14:13
Scanning 192.168.198.134 [1 port]
Completed ARP Ping Scan at 14:13, 0.04s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:13
Completed Parallel DNS resolution of 1 host. at 14:13, 0.00s elapsed
Initiating SYN Stealth Scan at 14:13
Scanning 192.168.198.134 [65535 ports]
Discovered open port 111/tcp on 192.168.198.134
Discovered open port 80/tcp on 192.168.198.134
Discovered open port 33830/tcp on 192.168.198.134
Completed SYN Stealth Scan at 14:13, 1.93s elapsed (65535 total ports)
Initiating Service scan at 14:13
Scanning 3 services on 192.168.198.134
Completed Service scan at 14:14, 11.02s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 192.168.198.134
NSE: Script scanning 192.168.198.134.
Initiating NSE at 14:14
Completed NSE at 14:15, 64.37s elapsed
Initiating NSE at 14:15
Completed NSE at 14:15, 0.02s elapsed
Nmap scan report for 192.168.198.134
Host is up (0.00042s latency).
Not shown: 65532 closed tcp ports (reset)
PORT      STATE SERVICE VERSION
80/tcp    open  http    nginx 1.6.2
|_http-dombased-xss: Couldn't find any DOM based XSS.
| vulners:
|   cpe:/a:igor_sysoev:nginx:1.6.2:
|       EDB-ID:40768    7.8     https://vulners.com/exploitdb/EDB-ID:40768      *EXPLOIT*
|       SSV:92538       7.2     https://vulners.com/seebug/SSV:92538    *EXPLOIT*
|       PRION:CVE-2016-1247     7.2     https://vulners.com/prion/PRION:CVE-2016-1247
|_      1337DAY-ID-26345        7.2     https://vulners.com/zdt/1337DAY-ID-26345        *EXPLOIT*
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-server-header: nginx/1.6.2
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.198.134
|   Found the following possible CSRF vulnerabilities:
|
|     Path: http://192.168.198.134:80/contact.php
|     Form id: fname
|_    Form action: thankyou.php
111/tcp   open  rpcbind 2-4 (RPC #100000)
| rpcinfo:
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100024  1          33830/tcp   status
|   100024  1          36704/tcp6  status
|   100024  1          52821/udp6  status
|_  100024  1          54900/udp   status
33830/tcp open  status  1 (RPC #100024)
MAC Address: 00:0C:29:CD:6E:79 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Uptime guess: 199.639 days (since Sun Nov 19 22:54:53 2023)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT     ADDRESS
1   0.42 ms 192.168.198.134
NSE: Script Post-scanning.
Initiating NSE at 14:15
Completed NSE at 14:15, 0.00s elapsed
Initiating NSE at 14:15
Completed NSE at 14:15, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 113.41 seconds
           Raw packets sent: 65558 (2.885MB) | Rcvd: 65550 (2.623MB)
目录
相关文章
|
9天前
|
人工智能 运维 安全
|
7天前
|
人工智能 异构计算
敬请锁定《C位面对面》,洞察通用计算如何在AI时代持续赋能企业创新,助力业务发展!
敬请锁定《C位面对面》,洞察通用计算如何在AI时代持续赋能企业创新,助力业务发展!
|
8天前
|
机器学习/深度学习 人工智能 自然语言处理
B站开源IndexTTS2,用极致表现力颠覆听觉体验
在语音合成技术不断演进的背景下,早期版本的IndexTTS虽然在多场景应用中展现出良好的表现,但在情感表达的细腻度与时长控制的精准性方面仍存在提升空间。为了解决这些问题,并进一步推动零样本语音合成在实际场景中的落地能力,B站语音团队对模型架构与训练策略进行了深度优化,推出了全新一代语音合成模型——IndexTTS2 。
676 23
|
8天前
|
人工智能 测试技术 API
智能体(AI Agent)搭建全攻略:从概念到实践的终极指南
在人工智能浪潮中,智能体(AI Agent)正成为变革性技术。它们具备自主决策、环境感知、任务执行等能力,广泛应用于日常任务与商业流程。本文详解智能体概念、架构及七步搭建指南,助你打造专属智能体,迎接智能自动化新时代。
|
14天前
|
人工智能 JavaScript 测试技术
Qwen3-Coder入门教程|10分钟搞定安装配置
Qwen3-Coder 挑战赛简介:无论你是编程小白还是办公达人,都能通过本教程快速上手 Qwen-Code CLI,利用 AI 轻松实现代码编写、文档处理等任务。内容涵盖 API 配置、CLI 安装及多种实用案例,助你提升效率,体验智能编码的乐趣。
1106 110
|
人工智能 数据可视化 数据挖掘
Quick BI 体验&征文有奖!
瓴羊生态推出Quick BI 征文激励计划,鼓励用户分享数据分析实践经验与技术洞察,征集高质量原创文章。内容围绕AI功能体验与BI案例实践,设季奖、年奖及参与奖,优秀作者可获现金奖励、产品内测资格及官方认证形象。投稿截止至2026年3月31日。
Quick BI 体验&征文有奖!