HacktheBox: Nibbles

My first step was to run Nmap against the machine to identify running services. # Nmap 7.80 scan initiated Mon Nov 2 13:11:02 2020 as: nmap -p- -sV -sC -O -oN scan 10.10.10.75 Nmap scan report for 10.10.10.75 Host is up (0.022s latency). Not shown: 65533 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh…

HackTheBox: Blue

I began this machine by running nmap to identify the local services. # Nmap 7.80 scan initiated Fri Oct 16 13:53:20 2020 as: nmap -oN scan -sV -sC -O -p- 10.10.10.40 Nmap scan report for 10.10.10.40 Host is up (0.042s latency). Not shown: 65526 closed ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows…

HackTheBox: Bashed

I started by running nMap against the machine. root@kali:/home/kali/Documents/bashed# nmap -oN scan -p- -O -sV -sC 10.10.10.68 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-07 12:50 EDT Nmap scan report for 10.10.10.68 Host is up (0.022s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18…

HackTheBox: Blocky

I began by performing an Nmap scan on the host: # Nmap 7.80 scan initiated Sun Oct 4 04:21:03 2020 as: nmap -sV -sC -p- -O -oN scan 10.10.10.37 Nmap scan report for 10.10.10.37 Host is up (0.019s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5a 22/tcp open…

HackTheBox: Beep

The first step, as with all machines is to run an Nmap scan to identify the running services. # Nmap 7.80 scan initiated Sun Aug 23 06:24:25 2020 as: nmap -oN scan -sV -O -p- -sC 10.10.10.7 Nmap scan report for 10.10.10.7 Host is up (0.033s latency). Not shown: 65519 closed ports PORT STATE SERVICE…

HackTheBox: LAME

This was such an easy machine, its almost not worth completing the write-up for it. But i decided in the end that i would, purely for completeness. I scanned the machine with NMAP, and was presented with the following details. # Nmap 7.70 scan initiated Thu Aug 22 10:10:07 2019 as: nmap -A -p- -oN…

HackTheBox: Writeup

this post describes the process of finding the user and root flags in HackTheBox Writeup machine. So as always¬† start with an Nmap scan to discover which services are running. # Nmap 7.70 scan initiated Tue Jun 25 12:42:32 2019 as: nmap -p- -O -sV -oN scan.txt 10.10.10.138 Nmap scan report for ip-10-10-10-138.eu-west-2.compute.internal (10.10.10.138) Host…

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p- 10.10.10.134 Nmap scan report for 10.10.10.134 Host is up (0.032s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 22/tcp open…

HackTheBox: Netmon

This is the second machine i have completed on HackTheBox. I started with the Access machine. The write-up for that can be found HERE. So the first step to the perform an Nmap scan to see what kind of services the machine is running: What sticks out the most in the results of this scan…

HackTheBox: Access

I should preface this by saying that this machine took me about 6 hours to complete overall. I went down a couple of rabbit holes i didn’t need to go down and the final solution was much simpler than i thought. My first step. Which is almost always the case when starting out on a…