HackTheBox: Legacy

I first started by running NMap against the host to discover running services: # Nmap 7.80 scan initiated Tue Sep 15 14:12:48 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.4 Nmap scan report for 10.10.10.4 Host is up (0.019s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft…

HackTheBox: Beep

The first step, as with all machines is to run an Nmap scan to identify the running services. # Nmap 7.80 scan initiated Sun Aug 23 06:24:25 2020 as: nmap -oN scan -sV -O -p- -sC 10.10.10.7 Nmap scan report for 10.10.10.7 Host is up (0.033s latency). Not shown: 65519 closed ports PORT STATE SERVICE…

HackTheBox: LAME

This was such an easy machine, its almost not worth completing the write-up for it. But i decided in the end that i would, purely for completeness. I scanned the machine with NMAP, and was presented with the following details. # Nmap 7.70 scan initiated Thu Aug 22 10:10:07 2019 as: nmap -A -p- -oN…

HackTheBox: Haystack

The first step. As is almost always the case is to run an Nmap scan on the host to discover which services are running: root@kali:~/Documents/haystack# nmap -A -oN scan 10.10.10.115 Starting Nmap 7.70 ( https://nmap.org ) at 2019-07-14 17:23 UTC Nmap scan report for 10.10.10.115 Host is up (0.017s latency). Not shown: 997 filtered ports…

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p- 10.10.10.134 Nmap scan report for 10.10.10.134 Host is up (0.032s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 22/tcp open…

nMap Visulisation

Introduction I have written a quick and dirty python script to visualise results from nMap and masscan. It works by parsing the XML log from a scan and generates a visual representation of the IP range that was scanned. The following screenshot is an example of the output: For lack of a better word I…