Offsec - InfosecPrep - Jun 21st 2023
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt 15:19:
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt 15:19:
Given Target [LAB_IP] rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v dirbuster http:
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]
Target: [LAB_IP] nmap -sV -sC -p- [LAB_IP] --open -oN FunboxEasy.scan Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-11 21:42 GMT Nmap scan report for [LAB_
Target is: [LAB_IP] nmap --top-ports 100 -sV [LAB_IP] -sC Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-13 04:19 EDT Nmap scan report for [LAB_IP] Host
Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish
OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/ Since target was given I don't have to run netdiscover to find target: Target is: [LAB_IP] $ nmap
Given Target: [LAB_IP] Recon nmap --top-ports 4000 -T5 -oN openPorts.txt [LAB_IP] Nmap scan report for [LAB_IP] Host is up (0.065s latency). Not shown: 3998 filtered
Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config
Given IP [LAB_IP] rustscan [LAB_IP] 21/tcp open ftp syn-ack 22/tcp open ssh syn-ack 80/tcp open http syn-ack sudo nmap -p21,22,80 -sC -sV -oN
Got IP target [TARGET_IP] Recon nmap -p- [TARGET_IP] -oN blue-nmap-ports Nmap scan report for [TARGET_IP] Host is up (0.054s latency). Not shown: 65526 closed tcp ports
\n\x20\x20\x20\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20 Er
Summary Given target is ip: [LAB_IP] Challenge says it's a windows system #Reconnaissance #Nmap sudo nmap -Pn -n -sC -sV -p- -v --open -oN all-ports.nmap [LAB_