pentesting

HTB Doctor Walkhrough

Protected HTB Doctor Walkhrough

HTB Unbalanced Walkhrough

Protected HTB Unbalanced Walkhrough

HTB Cache Walkhrough

Initial Recon We start the initial recon with a nmap scan to look for open ports are services running on them. PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 7.

HTB Blackfield Walkthrough

Nmap Scan # Nmap 7.80 scan initiated Fri Oct 2 13:54:21 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.10.10.192 Nmap scan report for 10.10.10.192 Host is up, received echo-reply ttl 127 (0.

HTB Admirer Writeup

Admirer Writeup we start the recon with a nmap scan to look for open ports and services running on them PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 63 vsftpd 3.

HTB Multimaster Writeup

Multimaster Writeup As usual we start the enumeration with a nmap scan to find open ports and services running on them. # Nmap 7.80 scan initiated Fri Sep 18 14:47:46 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.

HTB Oouch Writeup

Oouch Writeup Starting the recon with a nmap scan to scan for ports and services running on them PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 63 vsftpd 2.

HTB Cascade Writeup

Cascade Writeup We start with a nmap scan on the ip to scan tcp ports and the services running on them. # Nmap 7.80 scan initiated Wed Apr 1 11:48:58 2020 as: nmap -sC -sV -oA nmap/tcp-initial -vv 10.

Pivoting to internal networks using ssh like a boss

Pivoting using SSH Original Writeup on medium

HTB Luke Writeup

Luke Recon Nmap Scan We begin our reconnaissance by running an Nmap scan checking default scripts and testing for vulnerabilities. nmap -sC -sV -oA nmap/tcpInitial -vv 10.10.10.137 PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 63 vsftpd 3.