Proving Grounds Practice Codo Linux Lab ( Road to OSCP )
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章内容,抓住主要信息。文章讲的是渗透测试的步骤,从信息收集开始,使用各种工具和技术,比如Rustscan和nmap扫描端口,然后访问网页并枚举目录。 用户特别指出不需要以“文章内容总结”或“这篇文章”开头,直接写描述即可。所以我要确保开头简洁明了。同时,控制在一百字以内,意味着要精炼语言,去掉不必要的细节。 接下来,我需要确定关键词:渗透测试、信息收集、Rustscan扫描、nmap扫描、端口80和22、访问网页、枚举目录。把这些关键词连贯地组织起来,确保不超过字数限制。 最后,检查一下是否涵盖了所有主要步骤,并且表达清晰。这样用户就能快速了解文章的核心内容了。 </think> 文章描述了一次针对Offsec Linux Lab的渗透测试过程,从信息收集开始,使用Rustscan扫描端口发现开放的80和22端口,并进一步通过nmap扫描和网页目录枚举进行深入分析。 2026-2-10 18:14:14 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Cyb0rgBytes

Press enter or click to view image in full size

Codo Offsec Linux Lab ( Road to OSCP )

As always in every penetration testing engagements we start by reconnaissance and information gathering, in this step we try to get as much information about the target as possible.

We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other recon techniques.

In this lab we are tasked to pentest this Linux Lab : Codo on Offsec’s Proving grounds :

First step will be to check if the target is up and running, we could do so by sending ICMP requests to check if we can communicate with the target:

Press enter or click to view image in full size

Next I’ll start with the initial scan with Rustscan because why not?! to check for open ports:

Press enter or click to view image in full size

From the output we can see two open ports :

port 80 running on HTTP and port 22 running on SSH

Afterwards, I’ll navigate to the webpage running on port 80 and while I do that I’ll do two things, First I’ll run a full scan with nmap and second I’ll enumerate for possible web directories on port 80.


文章来源: https://infosecwriteups.com/proving-grounds-practice-codo-linux-lab-road-to-oscp-ab82689ee7ef?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh