草庐IT

VulnHub-Earth

全部标签

GEE(Google earth engine)中的Landsat影像的选择和去云(附代码)

 1.获取校正过的Landsat 影像        在这里可以看到GEE提供的全部Landsat数据:LandsatCollectionsinEarthEngine | EarthEngineDataCatalog | GoogleDevelopers       随便点进去,比如Landsat8,有三个数据,一个是地表面反射率数据,一个是大气层顶部的反射率数据,一个是raw。大气层顶部的反射数据需要进行大气校正才可以得到地表反照率。而raw数据自带了一个simplecomposite函数可以一步实现大气校正+去云(但亲测效果真的很靠运气,而且不是很好)。所以我推荐直接用地表反射率数据,不必

Vulnhub之Matrix Breakout 2 Morpheus靶机详细测试过程

MatrixBreakout:2Morpheus靶机信息名称:Matrix-Breakout:2Morpheus地址:https://www.vulnhub.com/entry/matrix-breakout-2-morpheus,757/虽然作者提示该靶机最好是在VirtualBox部署,但是经过测试,本靶机在VirtualBox无法启动,更适合导入到Vmware中。识别目标主机IP地址(kali㉿kali)-[~/Desktop/Vulnhub/Matrix_breakout]└─$sudonetdiscover-ieth1-r10.1.1.0/24Currentlyscanning:Fi

Vulnhub之Matrix Breakout 2 Morpheus靶机详细测试过程

MatrixBreakout:2Morpheus靶机信息名称:Matrix-Breakout:2Morpheus地址:https://www.vulnhub.com/entry/matrix-breakout-2-morpheus,757/虽然作者提示该靶机最好是在VirtualBox部署,但是经过测试,本靶机在VirtualBox无法启动,更适合导入到Vmware中。识别目标主机IP地址(kali㉿kali)-[~/Desktop/Vulnhub/Matrix_breakout]└─$sudonetdiscover-ieth1-r10.1.1.0/24Currentlyscanning:Fi

Vulnhub之Me and Mygirlfriend详细测试过程

MeandMygirlfriend作者:jasonhuawen靶机信息名称:MeandMyGirlfriend:1地址:https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/识别目标主机IP地址─(kali㉿kali)-[~/Vulnhub/Me_And_Mygirlfriend]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3

Vulnhub之Me and Mygirlfriend详细测试过程

MeandMygirlfriend作者:jasonhuawen靶机信息名称:MeandMyGirlfriend:1地址:https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/识别目标主机IP地址─(kali㉿kali)-[~/Vulnhub/Me_And_Mygirlfriend]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3

Vulnhub之BoredHackerBlog: Social Network_Medium Socnet详细测试过程(拿到root shell)

BoredHackerBlog:SocialNetwork作者:jasonhuawen靶机信息名称:BoredHackerBlog:SocialNetwork地址:https://www.vulnhub.com/entry/boredhackerblog-social-network,454/识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180__________________________________________

Vulnhub之BoredHackerBlog: Social Network_Medium Socnet详细测试过程(拿到root shell)

BoredHackerBlog:SocialNetwork作者:jasonhuawen靶机信息名称:BoredHackerBlog:SocialNetwork地址:https://www.vulnhub.com/entry/boredhackerblog-social-network,454/识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180__________________________________________

Vulnhub之Medium Socnet详细测试过程

MediumSocnet识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180_____________________________________________________________________________IPAtMACAddressCountLenMACVendor/Hostname------------------------------------------------------------

Vulnhub之Medium Socnet详细测试过程

MediumSocnet识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180_____________________________________________________________________________IPAtMACAddressCountLenMACVendor/Hostname------------------------------------------------------------

Vulnhub之Mhz_c1f靶机详细测试过程

Mhz_c1f作者:jasonhuawen靶机信息名称:mhz_cxf:c1f地址:https://www.vulnhub.com/entry/mhz_cxf-c1f,471/识别目标主机IP地址sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180_________________________________________________________