Offsec - CyberSploit1 - Apr 20th 2023
OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/ Since target was given I don't have to runĀ netdiscoverĀ to find target: Target is:Ā [LAB_IP] $ nmap
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and morešµļøāāļø Whether you're diving into the latest exploits or sharpening your skills š ļø.
OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/ Since target was given I don't have to runĀ netdiscoverĀ to find target: Target is:Ā [LAB_IP] $ nmap
Given Target: [LAB_IP] Recon nmap --top-ports 4000 -T5 -oN openPorts.txt [LAB_IP] Nmap scan report for [LAB_IP] Host is up (0.065s latency). Not shown: 3998 filtered
Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config
Given IP [LAB_IP] rustscan [LAB_IP] 21/tcp open ftp syn-ack 22/tcp open ssh syn-ack 80/tcp open http syn-ack sudo nmap -p21,22,80 -sC -sV -oN
Got IP target [TARGET_IP] Recon nmap -p- [TARGET_IP] -oN blue-nmap-ports Nmap scan report for [TARGET_IP] Host is up (0.054s latency). Not shown: 65526 closed tcp ports
\n\x20\x20\x20\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20 Er
Summary Given target is ip: [LAB_IP] Challenge says it's a windows system #Reconnaissance #Nmap sudo nmap -Pn -n -sC -sV -p- -v --open -oN all-ports.nmap [LAB_