Member-only story
Blunder | HackTheBox
Source: https://www.hackthebox.eu/home/machines/profile/254
— — — — — — Table of Contents — — — — — —
— Introduction
— Scanning
— Enumeration
— Vulnerability Analysis
— Exploitation
— Privesc
— — — — — — — — — — — — — — — — — — — —
Introduction
At the time, when I am writing this blog, the machine is still live and this is the first time I am ever going to try doing this. Let’s hope I am able to root this.
Scanning
Target IP: 10.10.10.191
Nmap Scan
nmap -sV -A -Pn $target
-sV : Probe open ports to determine service/version info
-A : Enable OS detection, version detection, script scanning, and traceroute
-Pn : Treat all hosts as online — skip host discovery
> ------------------------Nmap Results-----------------------------<
--------------------------------------------------------------------Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-20 04:01 IST
Nmap scan report for 10.10.10.191
Host is up (0.20s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
21/tcp…