CTF之命令注入(Dina 1.0)

练习环境

    攻击机:kali
    靶机:Ubuntu 12.04(Dina 1.0)

1.发现靶机,进行端口扫描

root@afei:~# ifconfig eth0
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.3.150  netmask 255.255.255.0  broadcast 192.168.3.255
        inet6 fe80::a312:9449:dbee:1e8f  prefixlen 64  scopeid 0x20<link>
        ether 00:0c:29:5b:f3:76  txqueuelen 1000  (Ethernet)
        RX packets 312215  bytes 270559805 (258.0 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX

你可能感兴趣的:(#,CTF)