linux
-
Read more: Protected: Instant – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: Protected: Sea – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: Protected: GreenHorn – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: PermX – Hack The Box – @lautarovculic
User.txt Let’s see what ports are open with nmap sudo nmap -sV -p- -Pn -vv -T4 10.10.11.23 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 Apache httpd 2.4.52 Service Info: Host: 127.0.1.1; OS: Linux; CPE: cpe:/o:linux:linux_kernel Let’s…
-
Read more: Editorial – Hack The Box – @lautarovculic
User.txt Let’s discover what open ports are here with nmap sudo nmap -sV -p- -Pn -vv -T4 10.129.75.79 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.7 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 (Ubuntu) Add the editorial.htb and tiempoarriba.htb to our /etc/hosts…
-
Read more: Blurry – Hack The Box – @lautarovculic
User.txt First, let’s discover the open ports with nmap sudo nmap -sV -p- -Pn -vv -T4 10.129.71.205 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 Let’s add blurry host to our /etc/hosts file sudo echo “10.129.71.205 blurry.htb”…
-
Read more: BoardLight – Hack The Box – @lautarovculic
User.txt First, we need know the ports and services that are present in the target sudo nmap -sV -p- -Pn -vv -T4 10.10.11.11 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 Apache httpd 2.4.41 ((Ubuntu)) Add boardlight.htb…
-
Read more: pwnFi
Simple Wi-Fi cracking automation. GitHub Description This Bash script is designed for performing Wi-Fi penetration testing attacks, specifically targeting WPA/WPA2 networks using PSK (Pre-Shared Key). It supports two attack modes: Handshake and PKMID attack. The script automates various steps including setting up monitor mode, capturing handshakes or PKMID messages, deauthentication, and cracking passwords using Aircrack-ng…
-
Read more: Runner – Hack The Box – @lautarovculic
User.txt First we will discover the open ports with nmap sudo nmap -sS -sU –min-rate 5000 -n -Pn -T4 -vv 10.10.11.13 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 (Ubuntu) 8000/tcp open nagios-nsca syn-ack ttl…
-
Read more: Usage – Hack The Box – @lautarovculic
User.txt Will discover open ports with nmap sudo nmap -sS -sV –min-rate 5000 -n -Pn -T4 -vv 10.10.11.18 Output PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 (Ubuntu) Inspectin the webserver in the port 80, we…