HackTheBox: Grandpa & Granny

The first step was to run an Nmap scan to discover services running on the machine: # Nmap 7.80 scan initiated Thu Nov 12 14:33:08 2020 as: nmap -sV -sC -O -p1-2056 -oN scan 10.10.10.14 Nmap scan report for 10.10.10.14 Host is up (0.014s latency). Not shown: 2055 filtered ports PORT STATE SERVICE VERSION 80/tcp…

HackTheBox: Blue

I began this machine by running nmap to identify the local services. # Nmap 7.80 scan initiated Fri Oct 16 13:53:20 2020 as: nmap -oN scan -sV -sC -O -p- 10.10.10.40 Nmap scan report for 10.10.10.40 Host is up (0.042s latency). Not shown: 65526 closed ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows…

HackTheBox: Shocker

The first step was to scan the machine with Nmap to find running services. # Nmap 7.80 scan initiated Sun Oct 4 13:05:39 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.56 Nmap scan report for 10.10.10.56 Host is up (0.016s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Optimum

My first step was to run Nmap and discover services running on the host. # Nmap 7.80 scan initiated Thu Sep 3 13:38:37 2020 as: nmap -p- -oN scan -sV -O -sC 10.10.10.8 Nmap scan report for 10.10.10.8 Host is up (0.020s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Heist

The first step is to run Nmap to find what services are running on the host. # Nmap 7.70 scan initiated Wed Aug 14 21:08:24 2019 as: nmap -A -p- -oN scan 10.10.10.149 Nmap scan report for 10.10.10.149 Host is up (0.031s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Luke

The first step, as always, Is to Nmap the host to identify running services: Nmap scan report for 10.10.10.137 Host is up (0.042s latency). Not shown: 65464 closed ports, 66 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3+ (ext.1) | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_drwxr-xr-x 2 0 0…

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p- 10.10.10.134 Nmap scan report for 10.10.10.134 Host is up (0.032s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 22/tcp open…