Offsec - FunboxRookie - May 13th 2023
Target is: [LAB_IP] nmap --top-ports 100 -sV [LAB_IP] -sC Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-13 04:19 EDT Nmap scan report for [LAB_IP] Host
Target is: [LAB_IP] nmap --top-ports 100 -sV [LAB_IP] -sC Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-13 04:19 EDT Nmap scan report for [LAB_IP] Host
Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish
OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/ Since target was given I don't have to run netdiscover to find target: Target is: [LAB_IP] $ nmap
Given Target: [LAB_IP] Recon nmap --top-ports 4000 -T5 -oN openPorts.txt [LAB_IP] Nmap scan report for [LAB_IP] Host is up (0.065s latency). Not shown: 3998 filtered
Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config
Given IP [LAB_IP] rustscan [LAB_IP] 21/tcp open ftp syn-ack 22/tcp open ssh syn-ack 80/tcp open http syn-ack sudo nmap -p21,22,80 -sC -sV -oN
Got IP target [TARGET_IP] Recon nmap -p- [TARGET_IP] -oN blue-nmap-ports Nmap scan report for [TARGET_IP] Host is up (0.054s latency). Not shown: 65526 closed tcp ports
\n\x20\x20\x20\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20 Er
Summary Given target is ip: [LAB_IP] Challenge says it's a windows system #Reconnaissance #Nmap sudo nmap -Pn -n -sC -sV -p- -v --open -oN all-ports.nmap [LAB_