-
Starting with nmap reveals the ports and services that the machine was running. Additionally, running nmap with vuln script exposes that the host was vulnerable to ssl-heartbleed vulnerability. Exploiting heartbleed gives a random key. A file hype_key was found while brute-forcing directories which turns out to be an …
Read More -
Enumeration Nmap Machine Name: Granny IP: 10.10.10.15 OS: Windows Server 2003 └─$ sudo nmap -A -T4 -p- 10.10.10.15 [sudo] password for kali: Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-27 19:01 EDT Nmap scan report for 10.10.10.15 Host is up (0.012s latency). Not shown: 65534 filtered ports PORT STATE SERVICE …
Read More -
Inspector Gadget The flag for this challenge is split into multiple parts and stored in different pages. The part is in main page. Second part can be found by viewing the source code of the main page. Third one in main.css file. And finally the fourth one in main.js. FLAG: …
Read More -
Sauna is a Hackthebox Active Directory Machine. The main goal here is to find a vulnerable service or misconfiguration from the machine and elevate our privileges to an Administrator account. In order to enumerate we have to follow the 5-Step process of penetration testing starting from Reconnaissance. Summary: …
Read More -
Cronos IP: 10.10.10.13 Host: Ubuntu-16.04.4 Nmap Let’s start with Nmap to discover the ports and services. Nmap scan report for 10.10.10.13 Host is up, received echo-reply ttl 63 (0.026s latency). Scanned at 2021-04-15 05:25:44 EDT for 108s Not shown: 65532 filtered ports Reason: 65532 no-responses PORT STATE …
Read More -
Node IP: 10.10.10.58 Nmap └─$ sudo nmap -A -T4 -p- -oA nmap/node 10.10.10.58 Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 08:59 EDT Stats: 0:01:16 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 79.49% done; ETC: 09:01 (0:00:20 remaining) Stats: 0:01:17 elapsed; …
Read More