靶机下载地址 http://vulnstack.qiyuanxuetang.net/vuln/detail/2/ 攻击拓扑如下 0x01环境搭建 配置两卡,仅主机模式192.168.52.0网段模拟内网,192.168.72.0网段模拟外网 Kali linux IP 192.168.72.131 win7 IP 192.168.72.130/192.168.52.143 win2003 IP 192.168.72.141 DC 2008 IP 192.168.52.138 0X02信息收集 用
#!/usr/bin/python # coding:utf-8 from PIL import Image, ImageDraw from HierarchicalClustering import hcluster from HierarchicalClustering import getheight from HierarchicalClustering import getdepth import numpy as np import os def drawdendrogram(clu