Proving Grounds Linux lab Levram ( Road to OSCP )
好的,用户让我总结一篇文章的内容,控制在100字以内,并且不要用“文章内容总结”之类的开头。我先看看文章讲的是什么。 文章主要讲的是渗透测试的步骤,包括信息收集、端口扫描和利用默认凭证登录。具体来说,他们使用了ping命令检查目标状态,用rustscan扫描端口,发现了22和8000端口,然后用默认凭证登录。 我需要把这些关键点浓缩到100字以内。首先,渗透测试的步骤:信息收集、扫描、登录。工具包括ping、rustscan。目标是BlackGate Linux Lab,发现端口22和8000,用默认凭证进入。 可能的结构:描述渗透测试的过程,使用的工具和发现的结果。确保简洁明了。 最后总结:在渗透测试中,使用信息收集和扫描工具识别目标BlackGate Linux Lab的开放端口(22和8000),并利用默认凭证成功登录。 </think> 在渗透测试中,通过信息收集和扫描工具识别目标BlackGate Linux Lab的开放端口(22和8000),并利用默认凭证成功登录。 2026-2-4 15:5:9 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Cyb0rgBytes

Press enter or click to view image in full size

Proving grounds Linux Offsec Box Levram

As always in every penetration testing engagements we start by reconnaissance and information gathering, in this step we try to get as much information about the target as possible.

We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other recon techniques.

In this lab we are tasked to pentest this Linux Lab : BlackGate on Offsec’s Proving grounds :

First step will be to check if the target is up and running, we could do so by sending ICMP requests to check if we can communicate with the target by running this command :

ping 192.168.204.24

Next I’ll run the following command with rustscan to quickly scan for open ports :

┌──(root💀CSEC)-[/home/cyborgbytes/Documents/PGWriteupsOffsec/Levram]
└─# rustscan -a 192.168.204.24 --ulimit 5000

Afterwards we can see the output as follows:

Press enter or click to view image in full size

From the scan I can see that there is two open ports :

Port 22 
and
Port 8000

going to the webpage on port 22 I can find that there is a login page and apparently I can login with default credentials:


文章来源: https://infosecwriteups.com/as-always-in-every-penetration-testing-engagements-we-start-by-reconnaissance-and-information-04bf8744dc7e?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh