kushanbhagya/Hackers-Lab

GitHub: kushanbhagya/Hackers-Lab

这是一个专注于道德黑客攻防技术的实战实验项目,通过在受控环境中记录从初始访问、漏洞利用到权限提升的完整攻击链,帮助学习者掌握真实网络安全场景下的攻击手法。

Stars: 0 | Forks: 0

``` ██╗ ██╗ █████╗ ██████╗██╗ ██╗███████╗██████╗ ███████╗ ██╗ █████╗ ██████╗ ██║ ██║██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗██╔════╝ ██║ ██╔══██╗██╔══██╗ ███████║███████║██║ █████╔╝ █████╗ ██████╔╝███████╗ ██║ ███████║██████╔╝ ██╔══██║██╔══██║██║ ██╔═██╗ ██╔══╝ ██╔══██╗╚════██║ ██║ ██╔══██║██╔══██╗ ██║ ██║██║ ██║╚██████╗██║ ██╗███████╗██║ ██║███████║ ███████╗██║ ██║██████╔╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝ ╚══════╝╚═╝ ╚═╝╚═════╝ ``` ### `⚔️ 攻防安全 · 道德黑客 · 真实攻击模拟`
![Last Updated](https://img.shields.io/badge/Last_Updated-2025-red?style=flat-square&logo=github) ![Labs](https://img.shields.io/badge/Labs-16_Planned-critical?style=flat-square&logo=gnubash) ![Status](https://img.shields.io/badge/Status-In_Progress-orange?style=flat-square&logo=statuspage) ![License](https://img.shields.io/badge/License-Educational_Only-blue?style=flat-square&logo=openssl) ![Platform](https://img.shields.io/badge/Platform-Kali_Linux-557C94?style=flat-square&logo=kalilinux&logoColor=white)
## > whoami 本仓库记录了我在攻防安全领域的实践历程,在**受控的实验室环境**中练习真实攻击技术、利用方法和系统攻陷模拟。 每一个实验都是一场战斗,也是一项技能的收获。 ## > cat objectives.txt ``` [*] Understand how real-world cyber attacks are executed [*] Gain hands-on exploitation experience across multiple vectors [*] Learn attacker methodologies: initial access → escalation → persistence [*] Build a professional cybersecurity portfolio through practical work [*] Bridge the gap between theory and real-world security scenarios ``` ## > ls skills/ | Domain | Techniques | |---|---| | 🌐 **网络利用** | 端口扫描、服务枚举、Banner 抓取 | | 💉 **Web 应用攻击** | SQLi、XSS、文件上传滥用、目录暴力破解 | | 🐚 **反向 Shell 与访问** | Netcat shell、TTY 升级、Web shell | | 🔺 **权限提升** | Sudo 错误配置、SUID 二进制文件、Cron 任务滥用 | | 🔍 **枚举** | LinPEAS、手动侦察、服务指纹识别 | | 🔑 **密码攻击** | 使用 John the Ripper 和 Hashcat 进行 Hash 破解 | | 👣 **持久化** | 后门、启动项操作 | | 🎯 **红队方法论** | 完整攻击链模拟 | ## > nmap --tools
![Kali Linux](https://img.shields.io/badge/Kali_Linux-557C94?style=for-the-badge&logo=kalilinux&logoColor=white) ![Nmap](https://img.shields.io/badge/Nmap-0E83CD?style=for-the-badge&logo=gnubash&logoColor=white) ![Burp Suite](https://img.shields.io/badge/Burp_Suite-FF6633?style=for-the-badge&logo=burpsuite&logoColor=white) ![Metasploit](https://img.shields.io/badge/Metasploit-2596CD?style=for-the-badge&logo=metasploit&logoColor=white) ![Netcat](https://img.shields.io/badge/Netcat-000000?style=for-the-badge&logo=gnubash&logoColor=white) ![Hashcat](https://img.shields.io/badge/Hashcat-FF0000?style=for-the-badge&logo=hashnode&logoColor=white) ![John](https://img.shields.io/badge/John_the_Ripper-CC0000?style=for-the-badge&logo=gnubash&logoColor=white) ![Gobuster](https://img.shields.io/badge/Gobuster-00AA00?style=for-the-badge&logo=gnubash&logoColor=white) ![DVWA](https://img.shields.io/badge/DVWA-8B0000?style=for-the-badge&logo=php&logoColor=white)
## > tree lab-structure/ ``` lab-xx-topic/ │ ├── 📄 README.md ← Objective, Setup, Attack Steps, Results ├── 📁 screenshots/ ← Visual proof of exploitation └── 📝 notes.md ← Additional findings & references ``` 每个实验包含: - **目标** — 我们要利用的内容及原因 - **设置** — 环境配置 - **攻击步骤** — 分步执行过程 - **原理解析** — 攻击生效的方式及原因 - **结果** — 结果与证据 - **关键收获** — 经验总结与防御见解 ## > cat roadmap.md ### 🔰 阶段 1 — 初始访问与利用 | # | Lab | Status | |---|-----|--------| | 01 | [🐚 反向 Shell (Netcat)](#-lab-01--reverse-shell-attack) | ✅ 已完成 | | 02 | 💉 Web 利用 – SQL 注入 | ⏳ 待进行 | | 03 | 🎭 跨站脚本攻击 (XSS) | ⏳ 待进行 | | 04 | 📂 目录暴力破解 (Gobuster) | ⏳ 待进行 | ### ⚔️ 阶段 2 — 高级访问技术 | # | Lab | Status | |---|-----|--------| | 05 | 📤 文件上传漏洞 | ⏳ 待进行 | | 06 | 🌐 Web Shell 注入 | ⏳ 待进行 | | 07 | 🔧 反向 Shell 升级 (TTY Shell) | ⏳ 待进行 | | 08 | 🔑 密码破解 (John / Hashcat) | ⏳ 待进行 | ### 🔥 阶段 3 — 权限提升 | # | Lab | Status | |---|-----|--------| | 09 | 🔍 Linux 枚举 (linPEAS) | ⏳ 待进行 | | 10 | ⚙️ Sudo 错误配置利用 | ⏳ 待进行 | | 11 | 🔏 SUID 二进制文件利用 | ⏳ 待进行 | | 12 | ⏰ Cron 任务利用 | ⏳ 待进行 | ### 🚀 阶段 4 — 后渗透与真实场景 | # | Lab | Status | |---|-----|--------| | 13 | 🔗 完整攻击链 (Web → Shell → Root) | ⏳ 待进行 | | 14 | 👣 持久化技术 | ⏳ 待进行 | | 15 | 💥 Metasploit 利用 | ⏳ 待进行 | | 16 | 🎮 多步骤攻击模拟 | ⏳ 待进行 | ### 🛡️ 扩展 — 蓝队集成 *(可选)* ``` [+] Detecting attacks using system logs [+] Monitoring suspicious network activity [+] Basic incident response practices ``` ## > cat progress.log ``` Total Labs Planned : 16 Labs Completed : 1 Labs In Progress : 0 Completion : [█░░░░░░░░░░░░░░░░░░░] 6% ``` ## > cat disclaimer.txt ``` ╔══════════════════════════════════════════════════════════╗ ║ ⚠️ EDUCATIONAL USE ONLY ║ ║ ║ ║ All techniques in this repository are performed ║ ║ exclusively in controlled, isolated lab environments. ║ ║ ║ ║ Unauthorized use of these techniques against systems ║ ║ without explicit permission is ILLEGAL. ║ ║ ║ ║ The author holds no responsibility for misuse. ║ ╚══════════════════════════════════════════════════════════╝ ``` ## > whoami --author
### **Kushan Bhagya** *网络安全爱好者 | 道德黑客学习者* [![GitHub](https://img.shields.io/badge/GitHub-Follow-181717?style=for-the-badge&logo=github)](https://github.com/) [![LinkedIn](https://img.shields.io/badge/LinkedIn-Connect-0A66C2?style=for-the-badge&logo=linkedin)](https://linkedin.com/)
*构建技能。破坏事物。恪守道德。* `[★ 如果觉得有用,请给这个仓库点个 Star]`
标签:CTI, TGT, Web安全, 子域名枚举, 实战实验, 提权, 攻击模拟, 攻防演练, 数据展示, 漏洞分析, 系统安全, 红队, 网络安全, 网络安全学习, 网络安全教育, 蓝队分析, 路径探测, 隐私保护, 驱动签名利用