-625029993 | 2024-05-27T10:52:27.819723
22 /
tcp
SSH-2.0-OpenSSH_7.4
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQDdr5aTBhj+Q4fIk25KYva0QNOzEhW9LUQEhtA3q6SaWUPW
Gz40ZwcrL/aFO700ReDtNAIaY6abwegfdGZzhwfniObiY3CnMQ59//G2w6Sp2I1EbeLFE//MMgDB
XsCQZFbYD03WaOcVTpv/169eyuNh/PU8ttJ4CWlR6foPJGS+ZwuC306lvUYCjHQ9OEOrVgr6g0ZG
7u5GCg/o2kY3LgGaKBfx9RZ06U72Jcze+hYc+ZljVemqw3iLUMAnrG36T1laVXo6n48VQVYpGuAK
TMrVA2u8RTAWoNlF2qYBDxGTsuvqa/2QXHwYbRtp3aSjn6/ZMPQqz65//XFYnj04WUsN
Fingerprint: 8c:40:37:c2:2f:ae:ee:7c:b3:d8:20:d4:47:1c:02:58
Kex Algorithms:
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group-exchange-sha1
diffie-hellman-group14-sha256
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
Server Host Key Algorithms:
ssh-rsa
rsa-sha2-512
rsa-sha2-256
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
3des-cbc
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
-1345205424 | 2024-05-24T20:45:37.795432
111 /
tcp
Portmap
Program Version Protocol Port
portmapper 4 tcp 111
portmapper 3 tcp 111
portmapper 2 tcp 111
portmapper 4 udp 111
portmapper 3 udp 111
portmapper 2 udp 111
-840169605 | 2024-05-25T06:45:40.208396
8081 /
tcp
HTTP/1.1 200 OK
Date: Sat, 25 May 2024 06:45:40 GMT
Server: Apache/2.4.10 (Debian)
Vary: Accept-Encoding
Content-Length: 4164
Content-Type: text/html;charset=utf-8
<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8"/>
<link rel="icon" type="image/x-icon" href="/img/favicon.png" />
<title>upload-labs</title>
</head>
<link rel="stylesheet" type="text/css" href="/css/index.css">
<link rel="stylesheet" type="text/css" href="/css/prism.css">
<body>
<div id="head">
<a href="/"><img src="/img/logo.png"/></a>
<div id="head_menu">
<a id="handle_code" href="javascript:show_code()">显示源码</a>
<a href="javascript:get_prompt()">查看提示</a>
<a href="javascript:clean_upload_file()">清空上传文件</a>
</div>
</div>
<div id="main"><div id="menu">
<ul id="menulist">
<li><a id="Pass-01" href="/Pass-01/index.php">Pass-01</a></li>
<li><a id="Pass-02" href="/Pass-02/index.php">Pass-02</a></li>
<li><a id="Pass-03" href="/Pass-03/index.php">Pass-03</a></li>
<li><a id="Pass-04" href="/Pass-04/index.php">Pass-04</a></li>
<li><a id="Pass-05" href="/Pass-05/index.php">Pass-05</a></li>
<li><a id="Pass-06" href="/Pass-06/index.php">Pass-06</a></li>
<li><a id="Pass-07" href="/Pass-07/index.php">Pass-07</a></li>
<li><a id="Pass-08" href="/Pass-08/index.php">Pass-08</a></li>
<li><a id="Pass-09" href="/Pass-09/index.php">Pass-09</a></li>
<li><a id="Pass-10" href="/Pass-10/index.php">Pass-10</a></li>
<li><a id="Pass-11" href="/Pass-11/index.php">Pass-11</a></li>
<li><a id="Pass-12" href="/Pass-12/index.php">Pass-12</a></li>
<li><a id="Pass-13" href="/Pass-13/index.php">Pass-13</a></li>
<li><a id="Pass-14" href="/Pass-14/index.php">Pass-14</a></li>
<li><a id="Pass-15" href="/Pass-15/index.php">Pass-15</a></li>
<li><a id="Pass-16" href="/Pass-16/index.php">Pass-16</a></li>
<li><a id="Pass-17" href="/Pass-17/index.php">Pass-17</a></li>
<li><a id="Pass-18" href="/Pass-18/index.php">Pass-18</a></li>
<li><a id="Pass-19" href="/Pass-19/index.php">Pass-19</a></li>
<li><a id="Pass-20" href="/Pass-20/index.php">Pass-20</a></li>
<li><a id="Pass-21" href="/Pass-21/index.php">Pass-21</a></li>
</ul>
</div>
<style type="text/css">
#head_menu a{
display: none;
}
</style>
<div id="upload_panel">
<ol>
<li>
<h3>简介</h3>
<p><code>upload-labs</code>是一个使用<code>php</code>语言编写的,专门收集渗透测试和CTF中遇到的各种上传漏洞的靶场。旨在帮助大家对上传漏洞有一个全面的了解。目前一共21关,每一关都包含着不同上传方式。</p>
</li>
<li>
<h3>注意</h3>
<p>1.每一关没有固定的通关方法,大家不要自限思维!</p>
<p>2.本项目提供的<code>writeup</code>只是起一个参考作用,希望大家可以分享出自己的通关思路。</p>
<p>3.实在没有思路时,可以点击<code>查看提示</code>。</p>
<p>4.如果黑盒情况下,实在做不出,可以点击<code>查看源码</code>。</p>
</li>
<li>
<h3>后续</h3>
<p>如在渗透测试实战中遇到新的上传漏洞类型,会更新到<code>upload-labs</code>中。当然如果你也希望参加到这个工作当中,欢迎<code>pull requests</code>给我!</p>
<p>项目地址:<code>https://github.com/c0ny1/upload-labs</code></p>
</li>
</ol>
</div>
</div>
<div id="footer">
<center>Copyright @ <span id="copyright_time"></span> by <a href="http://gv7.me" target="_bank">c0ny1</a></center>
</div>
<div class="mask"></div>
<div class="dialog">
<div class="dialog-title">提 示<a href="javascript:void(0)" class="close" title="关闭">关闭</a></div>
<div class="dialog-content"></div>
</div>
</body>
<script type="text/javascript" src="/js/jquery.min.js"></script>
<script type="text/javascript" src="/js/prism.js"></script>
<script type="text/javascript" src="/js/prism-line-numbers.min.js"></script>
<script type="text/javascript" src="/js/prism-php.min.js"></script>
<script type="text/javascript" src="/js/index.js"></script>
</html>