Web-Machine-N7靶机通关攻略
获取靶机ip
arp-scan -l

端口扫描
nmap xxxx

访问80端口发现没用
扫描目录
gobuster dir -u http:/192.168.117.160 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium,txt -x php,html,txt ,zip
打开exploit.html
点击F12,修改localhost为靶机ip,再随便上传一个文件

arp-scan -l

nmap xxxx

访问80端口发现没用
gobuster dir -u http:/192.168.117.160 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium,txt -x php,html,txt ,zip





将role进行解码,两次url解码,一次base64解码,一次md5解码,为admin