HackTheBox: Haystack

The first step. As is almost always the case is to run an Nmap scan on the host to discover which services are running: root@kali:~/Documents/haystack# nmap -A -oN scan 10.10.10.115 Starting Nmap 7.70 ( https://nmap.org ) at 2019-07-14 17:23 UTC Nmap scan report for 10.10.10.115 Host is up (0.017s latency). Not shown: 997 filtered ports…

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p- 10.10.10.134 Nmap scan report for 10.10.10.134 Host is up (0.032s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 22/tcp open…

nMap Visulisation

Introduction I have written a quick and dirty python script to visualise results from nMap and masscan. It works by parsing the XML log from a scan and generates a visual representation of the IP range that was scanned. The following screenshot is an example of the output: For lack of a better word I…