首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 【Kubernetes篇】Init 容器完整指南

    并写入附加到 Pod 的 /web-content 卷内的 ip.txt 文件。 名为 create-html 的第二个 Init 容器从 /web-content/ip.txt 文件中读取 Pod IP,该文件包含第一个 Init 容器创建的 Pod IP,并将其写入 /web-content Your Pod IP is: ' > /web-content/index.html; cat /web-content/ip.txt >> /web-content/index.html; echo 'Created index.html with the Pod IP'"] volumeMounts: - name: web-content mountPath: /web-content : /usr/share/nginx/html volumes: - name: web-content emptyDir: {}我们来部署这个 pod。

    57111编辑于 2025-05-15
  • 来自专栏渗透靶机

    Vulnhub靶机:Empire_LupinOne

    gobuster dir -u http://192.168.30.61/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase wfuzz --hh 275 -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt - ffuf -fs 278 -u "http://192.168.30.61/~secret/.FUZZ" -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase

    28100编辑于 2025-05-10
  • 来自专栏OneMoreThink的专栏

    靶场实战(13):OSCP备考之VulnHub GAARA

    使用命令gobuster dir -u http://172.16.33.69/ -w 字典,使用字典/usr/share/seclists/Discovery/Web-Content/directory-list-lowercase -2.3-small.txt和/usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt扫描网站的目录和文件 HTTP服务使用字典/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt,或者SSH服务使用字典/usr/share 2.3、80端口/HTTP服务 字典/usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt有22万条内容,其中肯定有之前

    25110编辑于 2024-10-15
  • 来自专栏渗透靶机

    hackmyvm靶机:OMG

    gobuster dir -u http://192.168.30.65/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase ffuf -u http://192.168.30.65/xampp/FUZZ -w /usr/share/seclists/Discovery/Web-Content/quickhits.txt -c

    30700编辑于 2025-05-20
  • 来自专栏FreeBuf

    如何使用Cook创建复杂的密码字典列表

    # File to access from anywhere files: raft_ext : [E:\tools\wordlists\SecLists\Discovery\Web-Content \raft-large-extensions.txt] raft_dir : [E:\tools\wordlists\SecLists\Discovery\Web-Content\raft-large-directories.txt ] raft_files : [E:\tools\wordlists\SecLists\Discovery\Web-Content\raft-large-files.txt] robot _1000 : [E:\tools\wordlists\SecLists\Discovery\Web-Content\RobotsDisallowed-Top1000.txt] # Create

    5.6K10发布于 2021-07-02
  • 来自专栏网络安全技术点滴分享

    SecLists - 安全测试payload百宝箱

    openwall.net-all.txt ssh://target 目录爆破 使用Discovery目录下的字典进行Web目录枚举: gobuster dir -u http://target -w SecLists/Discovery/Web-Content /common.txt API测试 使用CMS目录下的字典进行API端点枚举: ffuf -u http://target/FUZZ -w SecLists/Discovery/Web-Content/

    65500编辑于 2025-06-15
  • 来自专栏OneMoreThink的专栏

    靶机实战(1):Empire LupinOne

    使用命令wfuzz -c -z /usr/share/seclists/Discovery/Web-Content/common.txt –hc 404 http://10.58.81.112/~FUZZ 3.3、使用命令wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -z list,". 使用命令wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -z list,".txt"

    36310编辑于 2024-10-15
  • 来自专栏渗透靶机

    Vulnhub靶机:Red

    gobuster dir -u http://192.168.31.14/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase gobuster dir -u http://redrocks.win -w /usr/share/seclists/Discovery/Web-Content/CommonBackdoors-PHP.fuzz.txt

    43410编辑于 2025-05-04
  • 来自专栏渗透靶机

    vulnyx靶机:Ober

    gobuster dir -u http://192.168.30.56/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase

    14700编辑于 2025-05-06
  • 来自专栏渗透靶机

    Vulnhub靶机:Loweb

    gobuster dir -u http://192.168.30.52//library -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase

    34110编辑于 2025-04-26
  • 来自专栏渗透靶机

    vulnyx靶机:Basic

    dirsearch -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt -u http

    32510编辑于 2025-01-20
  • 来自专栏渗透靶机

    Vulnhub靶机:HackathonCTF-1

    gobuster dir -u 192.168.217.216 -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase

    45510编辑于 2025-02-23
  • 来自专栏渗透靶机

    vulnyx靶机:Deploy

    dirsearch -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt -u http

    29100编辑于 2025-01-22
  • 来自专栏渗透靶机

    vulnyx靶机:Beginner

    dirsearch -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt -u http

    20300编辑于 2025-01-21
  • 来自专栏渗透靶机

    vulnyx靶机:Diff3r3ntS3c

    dirsearch -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt -u http

    19100编辑于 2025-01-23
  • 来自专栏渗透靶机

    hackmyvm靶机:p4l4nc4

    也没什么特别的,突破口在robots.txtgobuster dir -u http://192.168.31.145 -w /usr/share/seclists/Discovery/Web-Content

    24200编辑于 2025-05-18
  • 来自专栏XRSec.Blog

    Vulnhub EvilBox靶机打靶过程

    此时的渗透工作似乎进入了瓶颈期,想到了可以对evil.php下的文件的get 变量进行 fuzz 测试,于是使用ffuf工具对其进行测试 ffuf -w /usr/share/SecLists/Discovery/Web-Content

    78110编辑于 2022-03-12
  • 来自专栏渗透靶机

    vulnyx靶机:First

    dirsearch -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt -u http

    19600编辑于 2025-01-16
  • 来自专栏渗透靶机

    vulnyx靶机:Brain

    /etc/passwd -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt --hh 361爆破一下参数

    16710编辑于 2025-02-07
  • 来自专栏字节脉搏实验室

    HTB-Blunder-Writeup

    使用wfuzz工具对该网站进行敏感文件扫描,字典是seclists/Discovery/Web-Content/commom.txt ?

    1K10发布于 2020-08-09
领券