HackTheBox: Kotarak

I started this machine by first running an Nmap scan: # Nmap 7.91 scan initiated Tue Jan 26 13:40:52 2021 as: nmap -p- -sC -sV -oN scan -O 10.10.10.55 Nmap scan report for 10.10.10.55 Host is up (0.021s latency). Not shown: 65531 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2…

HackTheBox: Nineveh

The first step was to run Nmap against the Nineveh machine: # Nmap 7.91 scan initiated Thu Dec 31 08:51:45 2020 as: nmap -oN scan -sC -O -sV -p- 10.10.10.43 Nmap scan report for 10.10.10.43 Host is up (0.042s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18…

HackTheBox: Shocker

The first step was to scan the machine with Nmap to find running services. # Nmap 7.80 scan initiated Sun Oct 4 13:05:39 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.56 Nmap scan report for 10.10.10.56 Host is up (0.016s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Blocky

I began by performing an Nmap scan on the host: # Nmap 7.80 scan initiated Sun Oct 4 04:21:03 2020 as: nmap -sV -sC -p- -O -oN scan 10.10.10.37 Nmap scan report for 10.10.10.37 Host is up (0.019s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5a 22/tcp open…