Offsec - Shakabrah - Jun 17th, 2023
Enumeration Target IP given is: [LAB_IP] Got OpenVAS working just for fun via docker. Only able to check the services and their versions for CVE's. No deep
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️‍♂️ Whether you're diving into the latest exploits or sharpening your skills 🛠️.
Enumeration Target IP given is: [LAB_IP] Got OpenVAS working just for fun via docker. Only able to check the services and their versions for CVE's. No deep
Given IP [LAB_IP] Netdiscover under normal non given circumstances rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP]
Target is: (Given) Recon nmap [TARGET_IP] --top-ports 4000 -T5 --open -oN openPorts.txt PORT STATE SERVICE 22/tcp open ssh 80/tcp open http nmap -sC -sV [TARGET_IP]
Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to
Potato company At the moment, there is nothing. This site is under construction. To make you wait, here is a photo of a potato: Login User: Password: Go to the
Started the OSCP playground box to get warmed up again on boxes. Connected hacking boxes with learning music via sheet music. At first, it's based on sheet music
Given Target: [LAB_IP] rustscan [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 3306/tcp open mysql syn-ack 33060/tcp open mysqlx
Given IP target: [LAB_IP] Recon rustscan -a [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 8000/tcp open http-alt syn-ack Making rustscan more efficient sudo docker
Target IP - [TARGET_IP] (Given) Recon nmap --top-ports 3000 -T5 [TARGET_IP] --open //Probably could do 5-10k PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt                  15:19:
Given Target [LAB_IP] rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v dirbuster http:
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]
Target:Â [LAB_IP] nmap -sV -sC -p-Â [LAB_IP]Â --open -oNÂ FunboxEasy.scan Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-11 21:42 GMT Nmap scan report for [LAB_
Target is: [LAB_IP] nmap --top-ports 100 -sV [LAB_IP] -sC Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-13 04:19 EDT Nmap scan report for [LAB_IP] Host
Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish