
附件是一个 .exe
的游戏文件,是使用 Unity 引擎制作的。
简单玩了下,游戏目的是通过方向键控制白色小球,吃掉所有的 Box,当数量达到 20 时可通关。
但是在游戏中可以收集的方块只有 6 个,这时候就得掏出大名鼎鼎的 CE 来修改游戏数据了。
下载链接:Cheat Engine
打开 CE 选择游戏进程

2025年3月23日...大约 1 分钟
——「」
附件是一个 .exe
的游戏文件,是使用 Unity 引擎制作的。
简单玩了下,游戏目的是通过方向键控制白色小球,吃掉所有的 Box,当数量达到 20 时可通关。
但是在游戏中可以收集的方块只有 6 个,这时候就得掏出大名鼎鼎的 CE 来修改游戏数据了。
下载链接:Cheat Engine
打开 CE 选择游戏进程
dev.linkvortex.htb
)$ rustscan -a 10.10.11.47
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: http://discord.skerritt.blog :
: https://github.com/RustScan/RustScan :
--------------------------------------
😵 https://admin.tryhackme.com
[~] Automatically increasing ulimit value to 5000.
Open 10.10.11.47:22
Open 10.10.11.47:80
[~] Starting Script(s)
[>] Running script "nmap -vvv -p {{port}} -{{ipversion}} {{ip}} -Pn -sV -A" on ip 10.10.11.47
Depending on the complexity of the script, results may take some time to appear.
[~] Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-18 17:56 HKT
Scanning dev.linkvortex.htb (10.10.11.47) [2 ports]
Discovered open port 22/tcp on 10.10.11.47
Discovered open port 80/tcp on 10.10.11.47
Nmap scan report for dev.linkvortex.htb (10.10.11.47)
Host is up, received user-set (0.29s latency).
Scanned at 2025-03-18 17:56:17 HKT for 9s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 3e:f8:b9:68:c8:eb:57:0f:cb:0b:47:b9:86:50:83:eb (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMHm4UQPajtDjitK8Adg02NRYua67JghmS5m3E+yMq2gwZZJQ/3sIDezw2DVl9trh0gUedrzkqAAG1IMi17G/HA=
| 256 a2:ea:6e:e1:b6:d7:e7:c5:86:69:ce:ba:05:9e:38:13 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKKLjX3ghPjmmBL2iV1RCQV9QELEU+NF06nbXTqqj4dz
80/tcp open http syn-ack Apache httpd
| http-git:
| 10.10.11.47:80/.git/
| Git repository found!
| Repository description: Unnamed repository; edit this file 'description' to name the...
| Remotes:
|_ https://github.com/TryGhost/Ghost.git
|_http-title: Launching Soon
| http-methods:
|_ Supported Methods: HEAD GET POST OPTIONS
|_http-server-header: Apache
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
dog.htb
)$ rustscan -a 10.10.11.58 --ulimit 5000
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: http://discord.skerritt.blog :
: https://github.com/RustScan/RustScan :
--------------------------------------
Please contribute more quotes to our GitHub https://github.com/rustscan/rustscan
[~] The config file is expected to be at "/Users/haynes/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
Open 10.10.11.58:22
Open 10.10.11.58:80
[~] Starting Script(s)
[~] Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-11 16:17 CST
Initiating Ping Scan at 16:17
Scanning 10.10.11.58 [2 ports]
Completed Ping Scan at 16:17, 0.44s elapsed (1 total hosts)
Initiating Connect Scan at 16:17
Scanning dog.htb (10.10.11.58) [2 ports]
Discovered open port 22/tcp on 10.10.11.58
Discovered open port 80/tcp on 10.10.11.58
Completed Connect Scan at 16:17, 0.44s elapsed (2 total ports)
Nmap scan report for dog.htb (10.10.11.58)
Host is up, received syn-ack (0.42s latency).
Scanned at 2025-03-11 16:17:12 CST for 1s
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack
80/tcp open http syn-ack
Read data files from: /opt/homebrew/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.91 seconds
用 rustscan 扫描靶机端口
$ rustscan -a 10.10.11.55 --ulimit 5000
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: http://discord.skerritt.blog :
: https://github.com/RustScan/RustScan :
--------------------------------------
RustScan: Making sure 'closed' isn't just a state of mind.
[~] The config file is expected to be at "/Users/haynes/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
Open 10.10.11.55:22
Open 10.10.11.55:80
[~] Starting Script(s)
[~] Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-10 16:55 CST
Initiating Ping Scan at 16:55
Scanning 10.10.11.55 [2 ports]
Completed Ping Scan at 16:55, 0.76s elapsed (1 total hosts)
Initiating Connect Scan at 16:55
Scanning titanic.htb (10.10.11.55) [2 ports]
Discovered open port 80/tcp on 10.10.11.55
Discovered open port 22/tcp on 10.10.11.55
Completed Connect Scan at 16:55, 0.47s elapsed (2 total ports)
Nmap scan report for titanic.htb (10.10.11.55)
Host is up, received conn-refused (0.37s latency).
Scanned at 2025-03-10 16:55:04 CST for 1s
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack
80/tcp open http syn-ack
拿到 Machine 的 IP 是 10.10.11.38
首先是扫描端口,查看开放端口
$ fscan -h 10.10.11.38 -p all
┌──────────────────────────────────────────────┐
│ ___ _ │
│ / _ \ ___ ___ _ __ __ _ ___| | __ │
│ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / │
│ / /_\\_____\__ \ (__| | | (_| | (__| < │
│ \____/ |___/\___|_| \__,_|\___|_|\_\ │
└──────────────────────────────────────────────┘
Fscan Version: 2.0.0
[2025-03-05 12:34:20] [INFO] 暴力破解线程数: 1
[2025-03-05 12:34:20] [INFO] 开始信息扫描
[2025-03-05 12:34:20] [INFO] 最终有效主机数量: 1
[2025-03-05 12:34:20] [INFO] 开始主机扫描
[2025-03-05 12:34:20] [INFO] 有效端口数量: 65535
[2025-03-05 12:34:20] [SUCCESS] 端口开放 10.10.11.38:22
[2025-03-05 12:34:20] [SUCCESS] 服务识别 10.10.11.38:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.11 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11.]
[2025-03-05 12:34:45] [SUCCESS] 端口开放 10.10.11.38:5000
[2025-03-05 12:34:50] [SUCCESS] 服务识别 10.10.11.38:5000 =>
[2025-03-05 12:39:27] [INFO] 存活端口数量: 2
[2025-03-05 12:39:28] [INFO] 开始漏洞扫描
[2025-03-05 12:39:28] [INFO] 加载的插件: ssh
[2025-03-05 12:39:28] [SUCCESS] 扫描已完成: 1/1
《King of the Hill》(KoTH)是一款竞争性黑客游戏,在游戏中你要与 10 名黑客对抗,攻破一台机器,然后修补其漏洞,阻止其他玩家获得访问权限。你保持访问的时间越长,你得到的积分就越多。
注册完之后加入不了房间,提示 Uh-oh! Only intermediate and advanced experienced leveled users can play King of the Hill.
测试脚本使用 融合怪测评脚本
bash <(wget -qO- ecs.0s.hk)
测试脚本使用 融合怪测评脚本
bash <(wget -qO- ecs.0s.hk)
Los Angeles AMD VPS - Specials - Starter
AMD EPYC 7003 Series, China Optimised, 9929&CMIN2
测试脚本使用 融合怪测评脚本