├── .gitignore ├── LICENSE ├── README.md └── asp └── 超级小旋风AspWebServer漏洞环境.zip /.gitignore: -------------------------------------------------------------------------------- 1 | 2 | .DS_Store 3 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 olist213 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | 2 | ## 0x01 靶场类别 3 | 4 | 搭建的基础环境一般可分成三类。 5 | 6 | 1、给了源代码,需要自己动手搭建的环境,有源码也可以通过docker搭建环境,通过Dockerfile去构建,上传至dockerhub可重复使用,java和php的构建比较简单,而asp/x用docker构建就比较少了,除了docker之外,php也可以用phpstudy这种集成环境搭建。 7 | 8 | 2、docker类的环境,这里说的docker类的环境指的是那种集成类的有CVE编号的环境,如vulfocus,vulhub等环境,前人已经构建好,我们只要docker pull下来即可。 9 | 10 | 3、vmware虚拟机靶场,这种靶场多涉及后渗透阶段,如内网渗透、域渗透等,如[GOAD](https://0x7e.cn/records/goad-game-of-active-directory)靶场。 11 | 12 | ## 0x02 工具 13 | 14 | 工艺善其事,必先利其器。 15 | 16 | - windows(docker desktop),mac(orb) 17 | - phpstudy(https://www.xp.cn/download.html) 18 | - ctfd 19 | - gzctf 20 | 21 | 如果自己想整合自己搭建的环境或公司内部给同事练习,可以搭建一个ctf平台,如ctfd和gzctf。ctfd结合[whale](https://github.com/frankli0324/ctfd-whale)插件可以实现动态flag,添加docker类环境。 22 | 23 | ![image](https://github.com/user-attachments/assets/550c8fe8-da27-4778-b96d-cba74439bda9) 24 | 25 | ctfd添加靶场可以去[dockerhub](https://hub.docker.com/)上找,如[vulfocus](https://hub.docker.com/u/vulfocus)的靶场环境。 26 | 27 | ![image](https://github.com/user-attachments/assets/fc379984-b8ca-43e8-8f9c-2b812dbb150c) 28 | 29 | ## 0x03 php环境 30 | 31 | - dvwa 32 | - https://dvwa.co.uk/ 33 | 34 | - PHP代码审计分段讲解 35 | - [php_bugs](https://github.com/bowu678/php_bugs) 36 | 37 | - Pikachu是一个带有漏洞的Web应用系统,在这里包含了常见的web安全漏洞。 38 | - [pikachu](https://github.com/zhuifengshaonianhanlu/pikachu),可docker部署 39 | - 在线pikachu类靶场:[渊龙Sec团队官方漏洞靶场](http://ctf.aabyss.cn/index.php) 40 | 41 | - 文件上传靶场 42 | - [upload-labs](https://github.com/c0ny1/upload-labs/releases/tag/0.1) 43 | 44 | - web漏洞靶场 45 | - ~~[webug](https://github.com/wangai3176/webug4.0)~~ 46 | - docker搭建:`docker pull area39/webug` 47 | 48 | - sqli注入靶场 49 | - [sqli-labs](https://github.com/skyblueee/sqli-labs-php7) 50 | 51 | - xxe漏洞靶场 52 | 53 | - [xxe-lab](https://github.com/c0ny1/xxe-lab) 54 | - [xxe08](https://github.com/mcc0624/XXE) 55 | 56 | - burpsuite的[官网](https://portswigger.net/web-security/all-labs)也提供了很多web方面的漏洞,都是主流漏洞。 57 | 58 | - php反序列化靶场 59 | 60 | - https://github.com/fine-1/php-SER-libs 61 | - https://github.com/ProbiusOfficial/PHPSerialize-labs 62 | - https://github.com/mcc0624/php_ser_Class 63 | 64 | - SSRF漏洞靶场 65 | - https://github.com/sqlsec/ssrf-vuls 66 | 67 | - 电气鼠靶场系统 68 | - https://github.com/linjiananallnt/ElectricRat 69 | 70 | - PHP命令执行漏洞的学习靶场 71 | - https://github.com/mcc0624/php_cmd/ 72 | 73 | - php反序列化docker环境 74 | - https://github.com/mcc0624/php_ser_Class 75 | 76 | docker搭建 77 | 78 | ``` 79 | docker pull mcc0624/ser:1.8 80 | docker run -p 8002:80 -d mcc0624/ser:1.8 81 | ``` 82 | 83 | ## 0x04 asp/x环境 84 | 85 | asp的环境需要设置iis环境,也可以使用超级小旋风AspWebServer漏洞环境。asp搭配的数据库是access、sqlserver,如果需要用到数据库也需要安装上。 86 | 87 | https://github.com/Larryxi/MSSQL-SQLi-Labs 88 | 89 | ## 0x05 jsp环境 90 | 91 | - [JAVA 漏洞靶场 (Vulnerability Environment For Java)](https://github.com/tangxiaofeng7/SecExample) 92 | - [Java漏洞靶场](https://github.com/l4yn3/micro_service_seclab) 93 | - [RASP测试靶场](https://github.com/javaweb-rasp/javaweb-vuln) 94 | - [JavaSecLab 一款综合Java漏洞平台](https://github.com/whgojp/JavaSecLab) 95 | - [Java Security,安全编码和代码审计](https://github.com/j3ers3/Hello-Java-Sec) 96 | - docker版:`docker pull liangchenga/javasec:1.5` 97 | 98 | ![image](https://user-images.githubusercontent.com/46209842/166251371-1b491599-a0d5-47f3-bb2a-91d7bcf44d2f.png) 99 | 100 | - [weblogic靶场](https://github.com/QAX-A-Team/WeblogicEnvironment) 101 | - [struts2漏洞环境](https://github.com/Ranwu0/Struts2-Tools) 102 | - [FastJson全版本Docker漏洞环境](https://github.com/lemono0/FastJsonParty) 103 | 104 | ## 0x06 逻辑漏洞靶场 105 | 106 | https://github.com/yingshang/ywljsec 107 | 108 | 逻辑漏洞靶场环境安装: 109 | 110 | ``` 111 | #安装django和faker 112 | python -m pip install Django 113 | pip3 install faker 114 | 115 | #初始化数据库 116 | 先运行python manage.py runserver,然后浏览器访问http://127.0.0.1:8000/init_data接口初始化数据库,后面访问http://127.0.0.1:8000/即可。 117 | ``` 118 | 119 | 做了个docker环境: 120 | 121 | ``` 122 | docker pull liangchenga/ljldsec:latest 123 | ``` 124 | 125 | ## 0x07 docker环境 126 | 127 | 使用docker快速搭建各大漏洞靶场,目前可以一键搭建17个靶场。 128 | 129 | - [vulstudy](https://github.com/c0ny1/vulstudy) 130 | 131 | ![](https://s2.loli.net/2022/02/23/J7P2UL6VrfcGutZ.png) 132 | 133 | 上述平台直接用docker即可一键搭建漏洞环境。 134 | 135 | Vulfocus 是一个漏洞集成平台,将漏洞环境 docker 镜像,放入即可使用,开箱即用,[vulhub](https://github.com/vulhub/vulhub)的一些漏洞环境vulfocus中也有,就不一一说明了。 136 | 137 | - [vulfocus](https://fofapro.github.io/vulfocus/#/) 138 | 139 | ```bash 140 | docker pull vulfocus/vulfocus:latest 141 | docker run -d -p 80:80 -v /var/run/docker.sock:/var/run/docker.sock -e VUL_IP=x.x.x.x(本机ip) vulfocus/vulfocus 142 | #账号密码:admin/admin 143 | ``` 144 | 145 | - iwebsec 146 | - docker pull iwebsec/iwebsec 147 | 148 | ## 0x08 虚拟机 149 | 150 | 虚拟机的漏洞环境,先介绍几个在线的网站,这些在线的靶场不需要下载。 151 | 152 | - [hackthebox](https://app.hackthebox.com/login) 153 | - [tryhackme](https://tryhackme.com/) 154 | - [attackdefense](https://attackdefense.com/) 155 | - [春秋云镜](https://yunjing.ichunqiu.com/) 156 | - [pentesterlab](https://pentesterlab.com/) 157 | 158 | 上面的这些网站,质量都挺高的,还有一些可自己尝试下,[Websites/Platforms to learn to hack](https://twitter.com/nandanlohitaksh/status/1580154447808065536)。 159 | 160 | 虚拟机类的靶场,通常需要自己下载[vmware](https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html)或[virtual box](https://www.virtualbox.org/)d的ova格式虚拟镜像,然后导入到虚拟机中运行。 161 | 162 | [vulnhub](https://www.vulnhub.com/)中有很多虚拟机靶场,目标都是获取flag。 163 | 164 | 注:在导入虚拟机后,首先需要获取靶机的ip地址,通常靶机都是dhcp获取ip,那么你就需要用nmap扫描你当前网段,如果网段内ip太多,就不容易识别,况且如果用vmware时,会有获取不到ip的情况。建议练习vulnhub的靶场时,用virtualbox虚拟机,如果是linux,导入后,进入修改密码的模式(开机按e),修改密码,先获取ip。 165 | 166 | 除了vulnhub的靶场,还有一些团队搭建的靶场环境,如: 167 | 168 | - 红日安全的[ATT&CK实战系列](http://vulnstack.qiyuanxuetang.net/vuln/)。 169 | 170 | ![](https://s2.loli.net/2022/02/23/H2NQuYJyzlErvbw.png) 171 | 172 | - [windows/linux本地特权提升实验](https://github.com/sagishahar/lpeworkshop),包含的内容都是提权相关的知识点。 173 | 174 | ![](https://s2.loli.net/2022/02/23/rMfBwJo3vOVuAnm.png) 175 | 176 | - vulntarget靶场系列 177 | 178 | https://github.com/crow821/vulntarget 179 | 180 | ## 0x09 其他 181 | 182 | [seed-labs[(https://github.com/Seanxz401/seed-labs):网络攻防课程中涉及的seed-labs实验代码和报告 183 | 184 | ## 0x10 ctf在线靶场 185 | 186 | - [buuoj](https://buuoj.cn/) 187 | - [ctf.show](https://ctf.show/) 188 | - [ctfhub](https://www.ctfhub.com/) 189 | - [WgpSec ctf](https://ctf.wgpsec.org/) 190 | - [316ctf](https://play.316ctf.com/) 191 | - [tctf](http://ctf.tidesec.com/) 192 | - [CTFd靶场搭建知识库](https://www.yuque.com/dat0u/ctfd/sm2tt0) 193 | - [NSSCTF](https://www.nssctf.cn/) 194 | - [ctftime](https://ctftime.org/) 195 | - [bugku](https://ctf.bugku.com/) 196 | - [picoctf](https://picoctf.org/) 197 | 198 | 199 | -------------------------------------------------------------------------------- /asp/超级小旋风AspWebServer漏洞环境.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/olist213/penetration_testing_env/06b6f250a32cad669a3c6bafd5b5b5688d5369c7/asp/超级小旋风AspWebServer漏洞环境.zip --------------------------------------------------------------------------------