HackTheBox: Bashed

I started by running nMap against the machine. root@kali:/home/kali/Documents/bashed# nmap -oN scan -p- -O -sV -sC 10.10.10.68 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-07 12:50 EDT Nmap scan report for 10.10.10.68 Host is up (0.022s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18…

HackTheBox: Shocker

The first step was to scan the machine with Nmap to find running services. # Nmap 7.80 scan initiated Sun Oct 4 13:05:39 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.56 Nmap scan report for 10.10.10.56 Host is up (0.016s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Blocky

I began by performing an Nmap scan on the host: # Nmap 7.80 scan initiated Sun Oct 4 04:21:03 2020 as: nmap -sV -sC -p- -O -oN scan 10.10.10.37 Nmap scan report for 10.10.10.37 Host is up (0.019s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5a 22/tcp open…

HackTheBox: Arctic

The first step was to run NMap against the machine: # Nmap 7.80 scan initiated Sat Sep 19 14:54:46 2020 as: nmap -sV -O -sC -p- -oN scan 10.10.10.11 Nmap scan report for 10.10.10.11 Host is up (0.021s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 8500/tcp…

HackTheBox: Devel

I first started by running Nmap against the machine. # Nmap 7.80 scan initiated Tue Sep 15 15:54:13 2020 as: nmap -sV -sC -O -oN scan -p- 10.10.10.5 Nmap scan report for 10.10.10.5 Host is up (0.023s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-anon: Anonymous…

HackTheBox: Legacy

I first started by running NMap against the host to discover running services: # Nmap 7.80 scan initiated Tue Sep 15 14:12:48 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.4 Nmap scan report for 10.10.10.4 Host is up (0.019s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft…

HackTheBox: Optimum

My first step was to run Nmap and discover services running on the host. # Nmap 7.80 scan initiated Thu Sep 3 13:38:37 2020 as: nmap -p- -oN scan -sV -O -sC 10.10.10.8 Nmap scan report for 10.10.10.8 Host is up (0.020s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Beep

The first step, as with all machines is to run an Nmap scan to identify the running services. # Nmap 7.80 scan initiated Sun Aug 23 06:24:25 2020 as: nmap -oN scan -sV -O -p- -sC 10.10.10.7 Nmap scan report for 10.10.10.7 Host is up (0.033s latency). Not shown: 65519 closed ports PORT STATE SERVICE…

HackTheBox: Heist

The first step is to run Nmap to find what services are running on the host. # Nmap 7.70 scan initiated Wed Aug 14 21:08:24 2019 as: nmap -A -p- -oN scan 10.10.10.149 Nmap scan report for 10.10.10.149 Host is up (0.031s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: LAME

This was such an easy machine, its almost not worth completing the write-up for it. But i decided in the end that i would, purely for completeness. I scanned the machine with NMAP, and was presented with the following details. # Nmap 7.70 scan initiated Thu Aug 22 10:10:07 2019 as: nmap -A -p- -oN…