Offsec - Sumo - Jun 15th 2023
Enumerate Looking for targets on subnet. Found [LAB_IP] ##Nmap Adding -O for OS detection in the field sudo nmap -sT -sV -sC -O --open -p- [LAB_IP] -oN sumo.
Enumerate Looking for targets on subnet. Found [LAB_IP] ##Nmap Adding -O for OS detection in the field sudo nmap -sT -sV -sC -O --open -p- [LAB_IP] -oN sumo.
Target given: [LAB_IP] Nmap on target: sudo nmap -sC -sV -v -p- [LAB_IP] (-sC Common scripts; -sV service Versions; -v verbose (start seeing data to research results sooner)
Given IP [LAB_IP] Netdiscover under normal non given circumstances rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP]
Target is: (Given) Recon nmap [TARGET_IP] --top-ports 4000 -T5 --open -oN openPorts.txt PORT STATE SERVICE 22/tcp open ssh 80/tcp open http nmap -sC -sV [TARGET_IP]
Target IP - [TARGET_IP] (Given) Recon nmap --top-ports 3000 -T5 [TARGET_IP] --open //Probably could do 5-10k PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/
Given IP [LAB_IP] rustscan [LAB_IP] 21/tcp open ftp syn-ack 22/tcp open ssh syn-ack 80/tcp open http syn-ack sudo nmap -p21,22,80 -sC -sV -oN