Proving Grounds Linux Lab Image
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要仔细阅读文章内容,理解主要信息。 文章讲的是渗透测试的过程,从信息收集开始,使用工具和技术获取目标的信息。然后提到他们正在测试一个Linux Lab,首先检查目标是否在线,发送ICMP请求。接着用rustscan扫描开放端口,发现80和22端口开放。最后提到ImageMagick的版本是6.9.6–4。 所以,总结的时候要涵盖这些关键点:渗透测试、信息收集、工具使用、目标状态检查、端口扫描结果以及软件版本。需要简洁明了,不超过100字。 可能的结构是:描述渗透测试过程,包括信息收集和工具使用;然后具体到Linux Lab的测试步骤:检查在线状态、扫描端口、发现80和22端口;最后提到ImageMagick的版本。 这样组织起来应该能准确概括文章内容。 </think> 本文描述了一次针对Offsec Proving Grounds上的Linux Lab进行渗透测试的过程。通过信息收集和工具使用(如ICMP请求和rustscan),确认目标在线并发现开放端口80和22。进一步研究发现目标使用的ImageMagick版本为6.9.6–4。 2026-2-12 05:38:51 Author: infosecwriteups.com(查看原文) 阅读量:2 收藏

Cyb0rgBytes

Press enter or click to view image in full size

Proving grounds Image Linux Lab ( Road to OSCP )

As always in every penetration testing engagements we start by reconnaissance and information gathering, in this step we try to get as much information about the target as possible.

We can achieve that by using various of tools and techniques to obtain foothold on the target, by using enumeration, scanning and other recon techniques.

In this lab we are tasked to pentest this Linux Lab : Image on Offsec’s Proving grounds :

First step will be to check if the target is up and running, we could do so by sending ICMP requests to check if we can communicate with the target by running this command :

Press enter or click to view image in full size

Next I’ll run rustscan to quickly scan for the open ports on the target:

Press enter or click to view image in full size

From there I can find two open ports :

80 and 22

Press enter or click to view image in full size

After some researching and searching for the target ImageMagick with the version : “Version: 6.9.6–4”


文章来源: https://infosecwriteups.com/as-always-in-every-penetration-testing-engagements-we-start-by-reconnaissance-and-information-bd3757b67dfc?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh