Sitemap
shellpwn

We are putting out this publication to share our findings and blogs with the world

Follow publication

Member-only story

Blunder | HackTheBox

--

Source: https://www.hackthebox.eu/home/machines/profile/254

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
— — — — — — — — — — — — — — — — — — — —

Introduction

At the time, when I am writing this blog, the machine is still live and this is the first time I am ever going to try doing this. Let’s hope I am able to root this.

Scanning

Target IP: 10.10.10.191

Nmap Scan

nmap -sV -A -Pn $target

-sV : Probe open ports to determine service/version info
-A : Enable OS detection, version detection, script scanning, and traceroute
-Pn : Treat all hosts as online — skip host discovery

> ------------------------Nmap Results-----------------------------<
--------------------------------------------------------------------
Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-20 04:01 IST
Nmap scan report for 10.10.10.191
Host is up (0.20s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
21/tcp…

--

--

shellpwn
shellpwn

Published in shellpwn

We are putting out this publication to share our findings and blogs with the world

Aaditya
Aaditya

Written by Aaditya

Penetration Tester @Experian | Founder @SHELL

No responses yet