Flu Proving Grounds linux lab
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容。文章主要讲的是渗透测试的步骤,特别是信息收集和扫描工具的使用。 用户可能是个网络安全的学生或者从业者,想快速了解渗透测试的基本流程。他们可能需要简洁明了的总结,用于学习或工作参考。深层需求可能是希望掌握渗透测试的关键步骤和常用工具。 接下来,我需要提取文章中的关键点:信息收集、使用nmap进行扫描、发现服务和漏洞。然后把这些点用简短的话表达出来,确保不超过一百字。 最后,检查一下是否符合要求,没有使用特定的开头,并且内容准确涵盖主要步骤。 </think> 文章描述了渗透测试的基本步骤,包括信息收集、使用nmap进行初始和全面扫描以发现目标系统的开放端口和服务,并利用这些信息进一步进行攻击或漏洞利用。 2026-3-17 04:52:7 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

Cyb0rgBytes

Press enter or click to view image in full size

AI Generated Image ( Sora/GPT )

Whenever we are in a pentest, there is things we have to take into consideration while infiltrating a machine or exploiting it’s services. there is also different entry points to the target whether it’s a misconfigured access control or a vulnerabilty of some sort.

Moving forward, the first step in a red team pentest is the following:

Information gathering, by that I’ll leverage the tools to gather as much information about the target as possible to later use those info to get access on the system.

Always when we want to see if the target is up and running we send ICMP Requests to see if it’s live and online:

Next for initial scan we scan with nmap :

└─# nmap -sC -sV 192.168.176.28 -oA initial -v

Press enter or click to view image in full size

`|_ Supported Methods: GET HEAD POST OPTIONS
|_http-favicon: Unknown favicon MD5: 2D58FC0104110AF4C9BE979DFD8FD83C
|_http-title: PluXml - Blog or CMS, XML powered !
|_http-server-header: Apache/2.4.56 (Debian)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel`

Next, just to make sure I’m not missing any crucial information I’ll run a full scan:

└─# nmap -p- -sC -sV 192.168.176.28 -oA full -v

文章来源: https://infosecwriteups.com/flu-proving-grounds-linux-lab-9e2f2502bfcf?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh