I started the machine by running NMap against it: ┌──(root💀kali)-[/home/kali/Documents/sunday] └─# nmap -p- -sV -sC -O -oN scan 10.10.10.76 –min-rate 1000 –max-retries 5 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-14 08:30 EST Warning: 10.10.10.76 giving up on port because retransmission cap hit (5). Stats: 0:01:15 elapsed; 0 hosts completed (1 up), 1 undergoing SYN…
Tag: hack the box
HackTheBox: Poison
I started by running Nmap against the machine: ┌──(root💀kali)-[/home/kali/Documents/poison] └─# nmap -sU -sS 10.10.10.84 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-10 15:40 EST Nmap scan report for 10.10.10.84 Host is up (0.053s latency). Not shown: 1961 closed ports, 36 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 514/udp open|filtered syslog Nmap…
HackTheBox: Valentine
I started by running NMap against the machine: ┌──(root💀kali)-[/home/kali/Documents/valentine] └─# nmap -p- -O -oN scan -sV -sC 10.10.10.79 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-10 12:59 EST Nmap scan report for valentine.htb (10.10.10.79) Host is up (0.022s latency). Not shown: 65532 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10…
HackTheBox: Kotarak
I started this machine by first running an Nmap scan: # Nmap 7.91 scan initiated Tue Jan 26 13:40:52 2021 as: nmap -p- -sC -sV -oN scan -O 10.10.10.55 Nmap scan report for 10.10.10.55 Host is up (0.021s latency). Not shown: 65531 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2…
HackTheBox: Solidstate
The first step as always was to run Nmap against the machine: ┌──(root💀kali)-[/home/kali/Documents/solidstate] └─# nmap -p- -oN scan -sC -sV -O 10.10.10.51 Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-22 13:52 EST Nmap scan report for 10.10.10.51 Host is up (0.022s latency). Not shown: 65529 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH…
HackTheBox: Jerry
I started by first running Nmap against the machine: ┌──(root💀kali)-[/home/kali/Documents/jerry] └─# nmap -p- -oN scan -sC -sV -O 10.10.10.95 Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-21 13:35 EST Stats: 0:01:52 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 57.10% done; ETC: 13:39 (0:01:21 remaining) Nmap scan…
HackTheBox: Sense
I’ll preface this post by saying that this machine was unusually easy, i don’t think I completed it as the author intended. But ill post my walkthrough anyhow. I started by running Nmap against the machine: # Nmap 7.91 scan initiated Mon Jan 18 13:16:52 2021 as: nmap -p- -oN scan -sC -sV 10.10.10.60 Nmap…
HackTheBox: Bounty
I started by running Nmap against the machine: # Nmap 7.91 scan initiated Mon Jan 4 13:24:42 2021 as: nmap -p- -oN scan -A -sV -O 10.10.10.93 Nmap scan report for 10.10.10.93 Host is up (0.021s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 7.5 | http-methods:…
HackTheBox: Cronos
The first step was to run Nmap against the machine to identity running services: # Nmap 7.91 scan initiated Mon Dec 7 13:46:38 2020 as: nmap -p- -sV -O -sV -oN scan 10.10.10.13 Nmap scan report for 10.10.10.13 Host is up (0.045s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh…
HacktheBox: Nibbles
My first step was to run Nmap against the machine to identify running services. # Nmap 7.80 scan initiated Mon Nov 2 13:11:02 2020 as: nmap -p- -sV -sC -O -oN scan 10.10.10.75 Nmap scan report for 10.10.10.75 Host is up (0.022s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh…