30 March 2023

Pentesting Fun Stuff

following the cyber security path…

As usual I'm starting with a port scan to get a list of open ports and running services. root@n0w4n:~/htb/curling# nmap...

Starting with port scan. root@n0w4n:~/opt/htb/popcorn# nmap -n -A -T4 -sC -oN scan -p- 10.10.10.6 Starting Nmap 7.70 ( https://nmap.org )...

Starting with a port scan. root@n0w4n:~# nmap -vv -n -T4 -A -sC -p- 10.10.10.22 Starting Nmap 7.70 ( https://nmap.org )...

Starting with a port scan. root@n0w4n:~# nmap -n -A -T4 -p- 10.10.10.79 Starting Nmap 7.70 ( https://nmap.org ) at 2018-07-04...

Starting of with a port scan. root@n0w4n:~/opt/htb/bastard# nmap -n -T4 -sS -sV -sC -oA nmap.bastard 10.10.10.9 Starting Nmap 7.70 (...

Starting with a port scan. root@n0w4n:~# nmap -n -sS -sV -p- 10.10.10.95 Starting Nmap 7.70 ( https://nmap.org ) at 2018-07-04...

Starting with a port scan. root@n0w4n:~/opt/htb/grandpa# nmap -T4 -n -sS -sV -sC -p- 10.10.10.14 Starting Nmap 7.70 ( https://nmap.org )...

First a scan to get the open ports and services running. PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3...

Introduction This is a machine from hackthebox.eu. According to the HTB policy I can publish this write-up seeing the machine...