HTB Write-Up: Haze
🧠 HTB Write-Up: Haze Difficulty: Hard OS: Linux Points: 30 Date: 2025-04-07 🔍 Reconnaissance 🔎 Nmap Scan Results Command Used: nmap -sV -sC 10.xx.xx.xx -v Target Host: 10.xx.xx.
🧠 HTB Write-Up: Haze Difficulty: Hard OS: Linux Points: 30 Date: 2025-04-07 🔍 Reconnaissance 🔎 Nmap Scan Results Command Used: nmap -sV -sC 10.xx.xx.xx -v Target Host: 10.xx.xx.
HackTheBox - Soulmate Writeup Machine Information * Name: Soulmate * IP: [MACHINE_IP] * OS: Linux * Difficulty: Easy * Points: 20 * Release Date: 06 Sep 2025 * Domains: soulmate.htb, ftp.soulmate.htb Summary Soulmate
Upon launching the machine in the HTB, I was promptly provided with an IP address to begin my exploration. My first step was to ensure a stable connection by pinging
Recon #nmap nmap --top-ports 1000 -T4 [LAB_IP] --open -Pn -vvv PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 139/tcp open netbios-ssn syn-ack
Upon spawning the machine, we got the ip address of the target machine. Let's run nmap to find the open ports using the following command - nmap -sV
Main Page Book List We are still setting up the library! Try later on!
Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to
Given IP target: [LAB_IP] Recon rustscan -a [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 8000/tcp open http-alt syn-ack Making rustscan more efficient sudo docker
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]
Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish
Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config
Summary Given target is ip: [LAB_IP] Challenge says it's a windows system #Reconnaissance #Nmap sudo nmap -Pn -n -sC -sV -p- -v --open -oN all-ports.nmap [LAB_