cybersecurity

HTB Write-Up: Haze

🧠 HTB Write-Up: Haze Difficulty: Hard OS: Linux Points: 30 Date: 2025-04-07 🔍 Reconnaissance 🔎 Nmap Scan Results Command Used: nmap -sV -sC 10.xx.xx.xx -v Target Host: 10.xx.xx.

1337 Sheets · · 12 min read Paid
reconnaissance

Offsec - Clue

Recon #nmap nmap --top-ports 1000 -T4 [LAB_IP] --open -Pn -vvv PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 139/tcp open netbios-ssn syn-ack

1337 Sheets · · 6 min read Paid
networking

Hack The Box - Dancing

Upon spawning the machine, we got the ip address of the target machine. Let's run nmap to find the open ports using the following command - nmap -sV

1337 Sheets · · 3 min read Paid
reconnaissance

pyLoader

Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to

1337 Sheets · · 5 min read Paid
reconnaissance

Dawn

Nov 13 2023 Target: [LAB_IP] Prep General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish

1337 Sheets · · 7 min read Paid
reconnaissance

Clam AV

Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config

1337 Sheets · · 4 min read Paid
reconnaissance

Access

Summary Given target is ip: [LAB_IP] Challenge says it's a windows system #Reconnaissance #Nmap sudo nmap -Pn -n -sC -sV -p- -v --open -oN all-ports.nmap [LAB_

1337 Sheets · · 10 min read Paid