一、环境搭建
1.环境描述
靶场描述
Much like DC-1, DC-2 is another purposely built vulnerable lab for the
purpose of gaining experience in the world of penetration testing.As with the original DC-1, it’s designed with beginners in mind.
Linux skills and familiarity with the Linux command line are a must,
as is some experience with basic penetration testing tools.Just like with DC-1, there are five flags including the final flag.
And again, just like with DC-1, the flags are important for beginners,
but not so important for those who have experience.In short, the only flag that really counts, is the final flag.
For beginners, Google is your friend. Well, apart from all the privacy
concerns etc etc.I haven’t explored all the ways to achieve root, as I scrapped the
previous version I had been working on, and started completely fresh
apart from the base OS install.
题目表述概括(目标)
解释:DC2和DC1一样,找到5个flag
2.靶场下载
下载地址
https://www.vulnhub.com/entry/dc-2,311/
3.环境启动
1.解压文件
2.在VMware中打开ova文件
3.接下来选择你想导入的路径,进行导入即可
4.注意 遇到这种报错可以忽略,点击重试继续导入
5.开启DC-2后,显示出登录界面就证明环境基本搭建好了
6.网络设置,要与攻击机kali在同一网段,要么都用NAT模式,要么都用桥接模式(我这里用是是NAT模式)