CTF—ssh私钥泄露

练习环境
攻击机:kali
靶机:covfefe(Linux)
攻击机和靶机需要在同一局域网中

目标:获取靶场机器上的flag值

1. 获取靶机IP,测试连通性

root@afei:~# ifconfig eth1
eth1: flags=4163  mtu 1500
        inet 192.168.3.150  netmask 255.255.255.0  broadcast 192.168.3.255
        inet6 fe80::20c:29ff:fefa:a7a3  prefixlen 64  scopeid 0x20
        ether 00:0c:29:fa:a7:a3  txqueuelen 1000  (Ethernet)
        RX packets 11778  bytes 1292184 (1.2 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 12085  bytes 5794372 (5.5 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

root@afei:~# netdiscover -r 192.168.3.1/24
Currently scanning: Finished!   |   Screen View: Unique Hosts                 
                                                                               
 4 Captured ARP Req/Rep packets, from 4 hosts.   Total size: 240               
 _______________________________

你可能感兴趣的:(#,CTF)