Offsec - Solstice - Jun 26th 2023
Main Page Book List We are still setting up the library! Try later on!
Offsec - Slort - Apr 22nd 2023
Target given: [LAB_IP] Nmap on target: sudo nmap -sC -sV -v -p- [LAB_IP] (-sC Common scripts; -sV service Versions; -v verbose (start seeing data to research results sooner)
Offsec - Sar - Nov 4th 2023
Given IP [LAB_IP] Netdiscover under normal non given circumstances rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP]
pyLoader
Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to
Offsec - Potato - June 4th 2023
Potato company At the moment, there is nothing. This site is under construction. To make you wait, here is a photo of a potato: Login User: Password: Go to the
TryHackMe - Kenobi - Oct 29th 2023
Target IP - [TARGET_IP] (Given) Recon nmap --top-ports 3000 -T5 [TARGET_IP] --open //Probably could do 5-10k PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/
Offsec - InfosecPrep - Jun 21st 2023
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt 15:19:
Offsec - ICMP - Nov 4th 2023
Given Target [LAB_IP] rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v dirbuster http:
Offsec - Gaara - Jun 3rd 2023
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]
Dawn
Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish
Offsec - BTRSys2.1 - Nov 4th 2023
Given IP [LAB_IP] rustscan [LAB_IP] 21/tcp open ftp syn-ack 22/tcp open ssh syn-ack 80/tcp open http syn-ack sudo nmap -p21,22,80 -sC -sV -oN