Proving Grounds Linux Box Extplorer ( Road to OSCP )
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章主要讲的是一个渗透测试的过程,目标是一个Linux系统。作者从信息收集开始,使用了ping命令确认目标在线,接着用Rustscan扫描开放端口。这些都是渗透测试的基本步骤。 接下来,我需要提取关键点:渗透测试、信息收集、工具使用(如ping和Rustscan)、目标系统(Linux)、扫描端口等。然后把这些点用简洁的语言组合起来,确保不超过100字。 可能的结构是先说明目标和主要步骤,然后提到使用的工具和技术。这样既全面又简洁。最后检查一下字数,确保符合要求。 </think> 文章描述了一次针对Offsec Proving Grounds中的Linux靶机Extplorer的渗透测试过程,首先通过ping命令确认目标在线状态,随后使用Rustscan工具扫描开放端口以识别运行的服务和端口信息。 2026-2-10 18:17:20 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Cyb0rgBytes

Press enter or click to view image in full size

Proving Grounds Linux Box ( Road to OSCP )

As always in every penetration testing engagements we start by reconnaissance and information gathering, in this step we try to get as much information about the target as possible.

We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other recon techniques.

In this lab we are tasked to pentest this Linux Lab : Extplorer on Offsec’s Proving grounds :

First step will be to check if the target is up and running, we could do so by sending ICMP requests to check if we can communicate with the target by running this command :

ping 192.168.243.16

Press enter or click to view image in full size

We can see from the screenshot above that the target is up and running, next I’ll run Rustscan to quickly check for open ports that will check which services and ports are running on the target system:

I’ll run the following command:

┌──(root💀CSEC)-[/home/cyborgbytes/Documents/PGWriteupsOffsec/Extplorer]
└─# rustscan -a 192.168.243.16 --ulimit 5000

The output is as shown in this screenshot:


文章来源: https://infosecwriteups.com/proving-grounds-linux-box-extplorer-road-to-oscp-008c742ea143?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh