I started by running NMap against the machine: ┌──(root💀kali)-[/home/kali/Documents/valentine] └─# nmap -p- -O -oN scan -sV -sC 10.10.10.79 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-10 12:59 EST Nmap scan report for valentine.htb (10.10.10.79) Host is up (0.022s latency). Not shown: 65532 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10…
Tag: nmap
HackTheBox: Jerry
I started by first running Nmap against the machine: ┌──(root💀kali)-[/home/kali/Documents/jerry] └─# nmap -p- -oN scan -sC -sV -O 10.10.10.95 Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-21 13:35 EST Stats: 0:01:52 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 57.10% done; ETC: 13:39 (0:01:21 remaining) Nmap scan…
HackTheBox: Sense
I’ll preface this post by saying that this machine was unusually easy, i don’t think I completed it as the author intended. But ill post my walkthrough anyhow. I started by running Nmap against the machine: # Nmap 7.91 scan initiated Mon Jan 18 13:16:52 2021 as: nmap -p- -oN scan -sC -sV 10.10.10.60 Nmap…
HackTheBox: Bounty
I started by running Nmap against the machine: # Nmap 7.91 scan initiated Mon Jan 4 13:24:42 2021 as: nmap -p- -oN scan -A -sV -O 10.10.10.93 Nmap scan report for 10.10.10.93 Host is up (0.021s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 7.5 | http-methods:…
HackTheBox: Nineveh
The first step was to run Nmap against the Nineveh machine: # Nmap 7.91 scan initiated Thu Dec 31 08:51:45 2020 as: nmap -oN scan -sC -O -sV -p- 10.10.10.43 Nmap scan report for 10.10.10.43 Host is up (0.042s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18…
HackTheBox: Silo
The first step was to run Nmap against the machine to identify hidden services: # Nmap 7.91 scan initiated Tue Dec 29 08:06:50 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.82 Nmap scan report for 10.10.10.82 Host is up (0.021s latency). Not shown: 65520 closed ports PORT STATE SERVICE VERSION 80/tcp open http…
HackTheBox: Bastard
My first step was to perform an Nmap scan against the machine: # Nmap 7.91 scan initiated Fri Dec 18 14:03:28 2020 as: nmap -sV -sC -p- -oN scan -O 10.10.10.9 Nmap scan report for 10.10.10.9 Host is up (0.029s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS…
HackTheBox: Grandpa & Granny
The first step was to run an Nmap scan to discover services running on the machine: # Nmap 7.80 scan initiated Thu Nov 12 14:33:08 2020 as: nmap -sV -sC -O -p1-2056 -oN scan 10.10.10.14 Nmap scan report for 10.10.10.14 Host is up (0.014s latency). Not shown: 2055 filtered ports PORT STATE SERVICE VERSION 80/tcp…
HackTheBox: Bashed
I started by running nMap against the machine. root@kali:/home/kali/Documents/bashed# nmap -oN scan -p- -O -sV -sC 10.10.10.68 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-07 12:50 EDT Nmap scan report for 10.10.10.68 Host is up (0.022s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18…
HackTheBox: Legacy
I first started by running NMap against the host to discover running services: # Nmap 7.80 scan initiated Tue Sep 15 14:12:48 2020 as: nmap -O -sV -sC -p- -oN scan 10.10.10.4 Nmap scan report for 10.10.10.4 Host is up (0.019s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft…