HackTheBox: Sunday

I started the machine by running NMap against it: β”Œβ”€β”€(rootπŸ’€kali)-[/home/kali/Documents/sunday] └─# nmap -p- -sV -sC -O -oN scan 10.10.10.76 –min-rate 1000 –max-retries 5 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-14 08:30 EST Warning: 10.10.10.76 giving up on port because retransmission cap hit (5). Stats: 0:01:15 elapsed; 0 hosts completed (1 up), 1 undergoing SYN…

HackTheBox: Poison

I started by running Nmap against the machine: β”Œβ”€β”€(rootπŸ’€kali)-[/home/kali/Documents/poison] └─# nmap -sU -sS 10.10.10.84 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-10 15:40 EST Nmap scan report for 10.10.10.84 Host is up (0.053s latency). Not shown: 1961 closed ports, 36 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 514/udp open|filtered syslog Nmap…

HackTheBox: Kotarak

I started this machine by first running an Nmap scan: # Nmap 7.91 scan initiated Tue Jan 26 13:40:52 2021 as: nmap -p- -sC -sV -oN scan -O 10.10.10.55 Nmap scan report for 10.10.10.55 Host is up (0.021s latency). Not shown: 65531 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2…

HackTheBox: Silo

The first step was to run Nmap against the machine to identify hidden services: # Nmap 7.91 scan initiated Tue Dec 29 08:06:50 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.82 Nmap scan report for 10.10.10.82 Host is up (0.021s latency). Not shown: 65520 closed ports PORT STATE SERVICE VERSION 80/tcp open http…

HackTheBox: Buff

My first step was to run Nmap against the host to identify running services: # Nmap 7.91 scan initiated Fri Nov 20 14:21:08 2020 as: nmap -sV -O -p- -sC -oN scan 10.10.10.198 Nmap scan report for 10.10.10.198 Host is up (0.024s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 7680/tcp open pando-pub?…