HackTheBox: Arctic

The first step was to run NMap against the machine: # Nmap 7.80 scan initiated Sat Sep 19 14:54:46 2020 as: nmap -sV -O -sC -p- -oN scan 10.10.10.11 Nmap scan report for 10.10.10.11 Host is up (0.021s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 8500/tcp…

HackTheBox: Devel

I first started by running Nmap against the machine. # Nmap 7.80 scan initiated Tue Sep 15 15:54:13 2020 as: nmap -sV -sC -O -oN scan -p- 10.10.10.5 Nmap scan report for 10.10.10.5 Host is up (0.023s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-anon: Anonymous…

HackTheBox: Optimum

My first step was to run Nmap and discover services running on the host. # Nmap 7.80 scan initiated Thu Sep 3 13:38:37 2020 as: nmap -p- -oN scan -sV -O -sC 10.10.10.8 Nmap scan report for 10.10.10.8 Host is up (0.020s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 80/tcp open http…