─$ sudo netdiscover -r 192.168.234.0/24 Currently scanning: Finished! | Screen View: Unique Hosts 3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname ----------------------------------------------------------------------------- 192.168.234.45 00:0c:29:1f:87:52 1 60 VMware, Inc. 192.168.234.196 20:1e:88:ad:fc:55 1 60 Intel Corporate 192.168.234.177 c6:62:32:b7:68:66 1 60 Unknown vendor
目标机器是192.168.134.45
👁 服务扫描
使用nmap对其进行扫描
1
sudo nmap -p- 192.168.234.45 --min-rate 8000
–min-rate 设置最小发包速度为8000,在靶场环境可以快速扫描出结果
🚪🚶 获取权限
一个个探测,经过尝试,smb服务中有一个txt文件,里面提示我们eric的后门以及关闭了。
23端口用telnet连接后,给了我们一个提示
1 2 3 4 5
telnet 192.168.234.45 23 ***** HAHAH! You're banned for a while, Billy Boy! By the way, I caught you trying to hack my wifi - but the joke's on you! I don't use ROTten passwords like rkfpuzrahngvat anymore! Madison Hotels is as good as MINE!!!! *****