<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>M3rl1n‘s Parterre</title><link>https://blog.cyberparterre.top</link><atom:link href="https://blog.cyberparterre.top/rss.xml" rel="self" type="application/rss+xml"/><description>M3rl1n‘s Parterre</description><generator>Halo v2.23.1</generator><language>zh-cn</language><image><url>https://blog.cyberparterre.top/upload/header.png</url><title>M3rl1n‘s Parterre</title><link>https://blog.cyberparterre.top</link></image><lastBuildDate>Mon, 13 Apr 2026 08:58:15 GMT</lastBuildDate><item><title><![CDATA[puppy]]></title><link>https://blog.cyberparterre.top/archives/HTB-puppy</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=puppy&amp;url=/archives/HTB-puppy" width="1" height="1" alt="" style="opacity:0;">MACHINE INFORMATION As is common in real life pentests, you will start the Puppy box with credentials for the following account: levi.james / KingofAk]]></description><guid isPermaLink="false">/archives/HTB-puppy</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Mon, 19 May 2025 15:25:52 GMT</pubDate></item><item><title><![CDATA[ThermalPower]]></title><link>https://blog.cyberparterre.top/archives/CQ-ThermalPower</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=ThermalPower&amp;url=/archives/CQ-ThermalPower" width="1" height="1" alt="" style="opacity:0;">heapdump leak $ ./fscan -h 39.98.114.81 ___ _ / _ \ ___ ___ _ __ __ _ ___| | __ / /_\/____/ __|/ __| ']]></description><guid isPermaLink="false">/archives/CQ-ThermalPower</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Thu, 17 Apr 2025 07:20:20 GMT</pubDate></item><item><title><![CDATA[无间计划]]></title><link>https://blog.cyberparterre.top/archives/CQ-WJJH</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=%E6%97%A0%E9%97%B4%E8%AE%A1%E5%88%92&amp;url=/archives/CQ-WJJH" width="1" height="1" alt="" style="opacity:0;">Network Topology 这里借用 h0ny 师傅的网络拓扑图来帮助理解靶场环境 website 1 PbootCMS 172.23.4.32 SSTI $ ../../scan/fscan1.8/fscan -h 39.99.226.73 ___]]></description><guid isPermaLink="false">/archives/CQ-WJJH</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Fri, 11 Apr 2025 09:06:15 GMT</pubDate></item><item><title><![CDATA[MagicRelay]]></title><link>https://blog.cyberparterre.top/archives/magicrelay</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=MagicRelay&amp;url=/archives/magicrelay" width="1" height="1" alt="" style="opacity:0;">redis dll劫持 └─$ ./fscan -h 39.99.157.234 ___ _ / _ \ ___ ___ _ __ __ _ ___| | __ / /_\/____/ __|/ __| ']]></description><guid isPermaLink="false">/archives/magicrelay</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Sat, 5 Apr 2025 15:29:11 GMT</pubDate></item><item><title><![CDATA[春秋云境-网鼎杯半决赛]]></title><link>https://blog.cyberparterre.top/archives/CQ-WDBBJS</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=%E6%98%A5%E7%A7%8B%E4%BA%91%E5%A2%83-%E7%BD%91%E9%BC%8E%E6%9D%AF%E5%8D%8A%E5%86%B3%E8%B5%9B&amp;url=/archives/CQ-WDBBJS" width="1" height="1" alt="" style="opacity:0;">fscan └─$ ./fscan18 -h 39.99.137.248 ___ _ / _ \ ___ ___ _ __ __ _ ___| | __ / /_\/____/ __|/ __| '__/]]></description><guid isPermaLink="false">/archives/CQ-WDBBJS</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Fri, 14 Mar 2025 06:52:40 GMT</pubDate></item><item><title><![CDATA[Privilege]]></title><link>https://blog.cyberparterre.top/archives/CQ-privilege</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Privilege&amp;url=/archives/CQ-privilege" width="1" height="1" alt="" style="opacity:0;">外网 任意文件读取 └─$ fscan -h 39.99.138.91 [SUCCESS] 端口开放 39.99.138.91:110 [SUCCESS] 端口开放 39.99.138.91:445 [SUCCESS] 端口开放 39.99.138.91:80 [SUCCESS] 端口开放]]></description><guid isPermaLink="false">/archives/CQ-privilege</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Tue, 11 Mar 2025 03:26:23 GMT</pubDate></item><item><title><![CDATA[GreatWall]]></title><link>https://blog.cyberparterre.top/archives/CQ-greatwall</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=GreatWall&amp;url=/archives/CQ-greatwall" width="1" height="1" alt="" style="opacity:0;">172.28.23.17 ThinkPHP5 RCE fscan一扫就发现了poc-yaml-thinkphp5023-method-rce直接使用工具就可以getshell └─$ fscan -h 8.130.110.53 [2025-03-10 13:50:11] [SUCCESS] 端口开放]]></description><guid isPermaLink="false">/archives/CQ-greatwall</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Mon, 10 Mar 2025 12:43:43 GMT</pubDate></item><item><title><![CDATA[Skyfall]]></title><link>https://blog.cyberparterre.top/archives/Skyfall</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Skyfall&amp;url=/archives/Skyfall" width="1" height="1" alt="" style="opacity:0;">Machine：Linux Level：Insane Fscan └─# fscan -h 10.10.11.254 -p 1-65537 ___ _ / _ \ ___ ___ _ __ __ _ ___|]]></description><guid isPermaLink="false">/archives/Skyfall</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Tue, 6 Feb 2024 04:48:12 GMT</pubDate></item><item><title><![CDATA[Delivery]]></title><link>https://blog.cyberparterre.top/archives/delivery</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Delivery&amp;url=/archives/delivery" width="1" height="1" alt="" style="opacity:0;">靶标介绍 在这个靶场中，您将扮演一名渗透测试工程师，受雇于一家名为 Delivery 的小型科技初创公司，并对该公司进行一次渗透测试。你的目标是成功获取域控制器权限，以评估公司的网络安全状况。该靶场共有 4 个 Flag，分布于不同的靶机。 知识点 XStream 内网渗透 域渗透 Hint 请测试]]></description><guid isPermaLink="false">/archives/delivery</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Tue, 6 Feb 2024 04:43:37 GMT</pubDate></item><item><title><![CDATA[Pov]]></title><link>https://blog.cyberparterre.top/archives/Pov</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Pov&amp;url=/archives/Pov" width="1" height="1" alt="" style="opacity:0;">Machine：Window Level：Hard Fscan └─$ fscan -h 10.10.11.251 -p 1-65537 ___ _ / _ \ ___ ___ _ __ __ _ ___| |]]></description><guid isPermaLink="false">/archives/Pov</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Wed, 31 Jan 2024 05:14:00 GMT</pubDate></item><item><title><![CDATA[Delegation]]></title><link>https://blog.cyberparterre.top/archives/Delegation</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Delegation&amp;url=/archives/Delegation" width="1" height="1" alt="" style="opacity:0;">靶标介绍 Delegation是一套难度为中等的靶场环境，完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法，加强对域环境核心认证机制的理解，以及掌握域环境渗透中一些有趣的技术要点。该靶场共有4个flag，分布于不同的靶机。 知识点 Brute Forc]]></description><guid isPermaLink="false">/archives/Delegation</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Sat, 27 Jan 2024 05:54:57 GMT</pubDate></item><item><title><![CDATA[Analysis]]></title><link>https://blog.cyberparterre.top/archives/Analysis</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Analysis&amp;url=/archives/Analysis" width="1" height="1" alt="" style="opacity:0;">Machine：Window Level：Hard Fscan └─# fscan -h 10.10.11.250 -p 1-65537 ___ _ / _ \ ___ ___ _ __ __ _ ___| |]]></description><guid isPermaLink="false">/archives/Analysis</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Sun, 21 Jan 2024 15:16:25 GMT</pubDate></item><item><title><![CDATA[Exchange]]></title><link>https://blog.cyberparterre.top/archives/exchange</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Exchange&amp;url=/archives/exchange" width="1" height="1" alt="" style="opacity:0;">靶标介绍 Exchange 是一套难度为中等的靶场环境，完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法，加强对域环境核心认证机制的理解，以及掌握域环境渗透中一些有趣的技术要点。该靶场共有 4 个 Flag，分布于不同的靶机。 知识点 JDBC Exc]]></description><guid isPermaLink="false">/archives/exchange</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Fri, 19 Jan 2024 13:28:29 GMT</pubDate></item><item><title><![CDATA[Monitored]]></title><link>https://blog.cyberparterre.top/archives/monitored</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Monitored&amp;url=/archives/monitored" width="1" height="1" alt="" style="opacity:0;">Machine：Linux Level：Medium Fscan └─# fscan -h 10.10.11.248 -p 1-65537 ___ _ / _ \ ___ ___ _ __ __ _ ___| |]]></description><guid isPermaLink="false">/archives/monitored</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Tue, 16 Jan 2024 08:12:22 GMT</pubDate></item><item><title><![CDATA[Bizness]]></title><link>https://blog.cyberparterre.top/archives/bizness</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Bizness&amp;url=/archives/bizness" width="1" height="1" alt="" style="opacity:0;">Machine：Linux Level：Easy Nmap └─# nmap -p- 10.10.11.252 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-01-06 23:37 EST Nmap scan report]]></description><guid isPermaLink="false">/archives/bizness</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Sun, 7 Jan 2024 06:09:12 GMT</pubDate></item><item><title><![CDATA[Hospital]]></title><link>https://blog.cyberparterre.top/archives/hospital</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Hospital&amp;url=/archives/hospital" width="1" height="1" alt="" style="opacity:0;">Hacked,空闲时补充完整 靶标介绍 在这个场景中，你将扮演一名渗透测试工程师，被派遣去测试某家医院的网络安全性。你的目标是成功获取所有服务器的权限，以评估公司的网络安全状况。该靶场共有 4 个flag，分布于不同的靶机。 知识点 内网渗透 Nacos Shiro Fastjson Decrypt]]></description><guid isPermaLink="false">/archives/hospital</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Mon, 1 Jan 2024 04:10:00 GMT</pubDate></item><item><title><![CDATA[Certify]]></title><link>https://blog.cyberparterre.top/archives/Certify</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Certify&amp;url=/archives/Certify" width="1" height="1" alt="" style="opacity:0;">靶标介绍 Certify是一套难度为中等的靶场环境，完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法，加强对域环境核心认证机制的理解，以及掌握域环境渗透中一些有趣的技术要点。该靶场共有4个flag，分布于不同的靶机。 知识点 AD CS SMB Ker]]></description><guid isPermaLink="false">/archives/Certify</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Thu, 21 Dec 2023 06:48:58 GMT</pubDate></item><item><title><![CDATA[Time]]></title><link>https://blog.cyberparterre.top/archives/Time</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Time&amp;url=/archives/Time" width="1" height="1" alt="" style="opacity:0;">靶标介绍 Time是一套难度为中等的靶场环境，完成该挑战可以帮助玩家了解内网渗透中的代理转发、内网扫描、信息收集、特权提升以及横向移动技术方法，加强对域环境核心认证机制的理解，以及掌握域环境渗透中一些有趣的技术要点。该靶场共有4个flag，分布于不同的靶机。 知识点 Neo4j Kerberos P]]></description><guid isPermaLink="false">/archives/Time</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Mon, 18 Dec 2023 14:01:30 GMT</pubDate></item><item><title><![CDATA[玄机-应急响应-Linux日志分析]]></title><link>https://blog.cyberparterre.top/archives/XUANJI-LinuxLogAnalysis</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=%E7%8E%84%E6%9C%BA-%E5%BA%94%E6%80%A5%E5%93%8D%E5%BA%94-Linux%E6%97%A5%E5%BF%97%E5%88%86%E6%9E%90&amp;url=/archives/XUANJI-LinuxLogAnalysis" width="1" height="1" alt="" style="opacity:0;">第一次玩这种应急响应类型的靶场，感觉没有渗透的好玩XD(😶‍🌫️ 简介 账号root密码linuxrz ssh root@IP 有多少IP在爆破主机ssh的root帐号，如果有多个使用","分割flag{192.168.200.2,192.168.200.32,192.168.200.31}]]></description><guid isPermaLink="false">/archives/XUANJI-LinuxLogAnalysis</guid><dc:creator>Administrator</dc:creator><category>Security Response</category><pubDate>Thu, 14 Dec 2023 06:29:36 GMT</pubDate></item><item><title><![CDATA[Surveillance]]></title><link>https://blog.cyberparterre.top/archives/Surveillance</link><description><![CDATA[<img src="https://blog.cyberparterre.top/plugins/feed/assets/telemetry.gif?title=Surveillance&amp;url=/archives/Surveillance" width="1" height="1" alt="" style="opacity:0;">Machine：Linux Level：Medium Fscan └─# fscan -h 10.10.11.245 ___ _ / _ \ ___ ___ _ __ __ _ ___| | __ / /_]]></description><guid isPermaLink="false">/archives/Surveillance</guid><dc:creator>Administrator</dc:creator><category>Pentest</category><pubDate>Wed, 13 Dec 2023 07:32:29 GMT</pubDate></item></channel></rss>