当前位置:网站首页>New network security competition of the secondary vocational group in 2022

New network security competition of the secondary vocational group in 2022

2022-06-25 23:02:00 Beluga

2022 The network security competition of the secondary vocational group

B-8:JavaScript Security around

  1. Use the Infiltrator scene kali Scan server with tools in , On the server apache The version number is used as flag Submit ;
  2. Use the Infiltrator scene windows7 Visit the web site in the server scenario ( Site path is IP/javascript), Find the homepage of the website flag And submit ;
  3. Use the Infiltrator scene windows7 Continue to access the server according to the entry of the second question , Get... Through the prompt flag And submit ;
  4. Use the Infiltrator scene windows7 Continue to access the server according to the third question , Get... Through the prompt flag And submit ;
  5. Use the Infiltrator scene windows7 Continue to access the server according to the entry of question 4 , Get... Through the prompt flag And submit ;
  6. Use the Infiltrator scene windows7 Continue to access the server according to the entry of question 5 , Get... Through the prompt flag And submit ;

B-9:Linux System penetration rights

  1. Use the infiltration machine to collect server information , And the server SSH The service port number is used as flag Submit ;
  2. Use the infiltration machine to collect server information , And take the host name in the server as flag Submit ;
  3. Use the infiltration machine to collect server information , The kernel version of the system in the server is used as flag Submit ;
  4. Use the Infiltrator to authorize the server administrator , And the server root The text content under the directory is used as flag Submit ;
  5. Use the Infiltrator to authorize the server administrator , And the server root Password for as flag Submit ;
  6. Use the Infiltrator to authorize the server administrator , And the server root The contents of the pictures in the directory are used as flag Submit .

B-10: Hidden information exploration

  1. Access to the server FTP service , Download the pictures QR, Get... From the picture flag, And will flag Submit ;
  2. Access to the server FTP service , Download the file document, Get... From the file flag, And will flag Submit ;
  3. Access to the server FTP service , Download the pictures beach, Get... From the picture flag, And will flag Submit ;
  4. Access to the server FTP service , Download the pictures grass, Get... From the picture flag, And will flag Submit ;
  5. Access to the server FTP service , Download the pictures tree, Get... From the picture flag, And will flag Submit ;
  6. Access to the server FTP service , Download the compressed file style, Get... From the compressed file flag, And will flag Submit .
原网站

版权声明
本文为[Beluga]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/176/202206251914391262.html