Offsec - Solstice - Jun 26th 2023
Main Page Book List We are still setting up the library! Try later on!
Main Page Book List We are still setting up the library! Try later on!
Target given: [LAB_IP] Nmap on target: sudo nmap -sC -sV -v -p- [LAB_IP] (-sC Common scripts; -sV service Versions; -v verbose (start seeing data to research results sooner)
Enumeration Target IP given is: [LAB_IP] Got OpenVAS working just for fun via docker. Only able to check the services and their versions for CVE's. No deep
Given IP [LAB_IP] Netdiscover under normal non given circumstances rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP]
Target is: (Given) Recon nmap [TARGET_IP] --top-ports 4000 -T5 --open -oN openPorts.txt PORT STATE SERVICE 22/tcp open ssh 80/tcp open http nmap -sC -sV [TARGET_IP]
Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to
Potato company At the moment, there is nothing. This site is under construction. To make you wait, here is a photo of a potato: Login User: Password: Go to the
Started the OSCP playground box to get warmed up again on boxes. Connected hacking boxes with learning music via sheet music. At first, it's based on sheet music
Given Target: [LAB_IP] rustscan [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 3306/tcp open mysql syn-ack 33060/tcp open mysqlx
Given IP target: [LAB_IP] Recon rustscan -a [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 8000/tcp open http-alt syn-ack Making rustscan more efficient sudo docker
Target IP - [TARGET_IP] (Given) Recon nmap --top-ports 3000 -T5 [TARGET_IP] --open //Probably could do 5-10k PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt 15:19:
Given Target [LAB_IP] rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v dirbuster http:
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]
Target: [LAB_IP] nmap -sV -sC -p- [LAB_IP] --open -oN FunboxEasy.scan Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-11 21:42 GMT Nmap scan report for [LAB_