-
Starting with nmap reveals the ports and services that the machine was running. Additionally, running nmap with vuln script exposes that the host was vulnerable to ssl-heartbleed vulnerability. Exploiting heartbleed gives a random key. A file hype_key was found while brute-forcing directories which turns out to be an …
Read More -
Cronos IP: 10.10.10.13 Host: Ubuntu-16.04.4 Nmap Let’s start with Nmap to discover the ports and services. Nmap scan report for 10.10.10.13 Host is up, received echo-reply ttl 63 (0.026s latency). Scanned at 2021-04-15 05:25:44 EDT for 108s Not shown: 65532 filtered ports Reason: 65532 no-responses PORT STATE …
Read More -
Node IP: 10.10.10.58 Nmap └─$ sudo nmap -A -T4 -p- -oA nmap/node 10.10.10.58 Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 08:59 EDT Stats: 0:01:16 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 79.49% done; ETC: 09:01 (0:00:20 remaining) Stats: 0:01:17 elapsed; …
Read More