Astronaut Proving Grounds Linux Machine ( Road to OSCP)
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是渗透测试的过程,从信息收集开始,使用工具如ping和nmap进行扫描。目标是一个Linux机器,运行着Grav-CMS。用户可能需要一个简洁的总结,用于快速了解文章内容。 接下来,我要确保总结准确涵盖关键点:渗透测试、信息收集、工具使用、目标系统和发现的漏洞。同时要注意字数限制,不能超过100字。 最后,组织语言,使其流畅自然,直接描述内容,不使用任何开头语。这样用户就能快速获取所需信息了。 </think> 文章描述了一次针对Offsec Proving Grounds中Linux机器Astronaut的渗透测试过程。通过信息收集、端口扫描和漏洞识别等步骤,利用nmap工具对目标进行初步和全面扫描,并发现其Web服务运行Grav-CMS系统。 2026-2-10 18:14:23 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Cyb0rgBytes

Press enter or click to view image in full size

Astronaut Proving Grounds Linux Machine ( Road to OSCP)

As always in every penetration testing engagements we start by reconnaissance and information gathering, in this step we try to get as much information about the target as possible.

We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other recon techniques.

In this lab we are tasked to pentest this Linux Lab : Astronaut on Offsec’s Proving grounds :

First step will be to check if the target is up and running, we could do so by sending ICMP requests to check if we can communicate with the target:

ping 192.168.193.98

Next I’ll scan the target by using nmap :

nmap -sC -sV 192.168.132.12 -oA initial -Pn -v

We can see that there is two open ports on the target, next I’d initiate a full scan on the target, just to make sure we are not missing anything important.

nmap -p- -sC -sV 192.168.132.12 -oA full -Pn -v

However something worth mentioning port 80 is the web-directory : 2021–03–17 17:46 grav-admin/

The webpage is running Grav-CMS, the next step is to identify the version number.


文章来源: https://infosecwriteups.com/as-always-in-every-penetration-testing-engagements-we-start-by-reconnaissance-and-information-8811ce8e7768?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh