pentesting

HTB Worker Walkthrough

As usual we start with a nmap scan to find open ports and services on the server. ┌──(codacker㉿kali)-[~/Workspace/HTB/boxes/Worker] └─$ sudo nmap -sC -sV -oA nmap/tcp-initial -vv 10.10.10.203 ... PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.

HTB Academy Walkthrough

Academy Walkthrough Enumeration running nmap scan we find two ports (22, 80) are open and the machine also leaks a hostname as academy.htb # Nmap 7.91 scan initiated Sun Jan 10 12:56:59 2021 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.

HTB Time Walkthrough

Initial Recon Running a nmap scan on the server to look for open ports and services. ┌──(codacker㉿kali)-[~/Workspace/HTB/boxes/Time] └─$ sudo nmap -sC -sV -oA nmap/tcp-initial -vv 10.10.10.214 we find that port 22 (SSH) and port 80 (Apache) are open on the server.

HTB Doctor Walkhrough

Recon we start with a nmap scan to look for open ports and services on the server. # Nmap 7.91 scan initiated Wed Oct 14 21:14:03 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.

HTB Unbalanced Walkhrough

We start with a nmap scan to look for open ports and services running on the server. PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.

HTB Cache Walkhrough

Initial Recon We start the initial recon with a nmap scan to look for open ports are services running on them. PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 7.

HTB Blackfield Walkthrough

Nmap Scan # Nmap 7.80 scan initiated Fri Oct 2 13:54:21 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.10.10.192 Nmap scan report for 10.10.10.192 Host is up, received echo-reply ttl 127 (0.

HTB Admirer Writeup

Admirer Writeup we start the recon with a nmap scan to look for open ports and services running on them PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 63 vsftpd 3.

HTB Multimaster Writeup

Multimaster Writeup As usual we start the enumeration with a nmap scan to find open ports and services running on them. # Nmap 7.80 scan initiated Fri Sep 18 14:47:46 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.

HTB Oouch Writeup

Oouch Writeup Starting the recon with a nmap scan to scan for ports and services running on them PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 63 vsftpd 2.