VULNHUB

Djinn_1-(VULNHUB)

Report Link: https://download.vulnhub.com/djinn/djinn.ova root@kali:~/Downloads# nmap -A 192.168.135.133 Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-01 08:46 GMT Nmap scan report for 192.168.135.133 Host is up (0.00043s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-anon: Anonymous FTP login allowed (FTP code 230) | -rw-r–r– 1 0 0 […]

VULNHUB

HA_DHANUSH – (VULNHUB)

VM Link: http://download.vulnhub.com/ha/dhanush.zip root@kali:~/Downloads# nmap -A 192.168.135.131 Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 16:12 GMT Nmap scan report for 192.168.135.131 Host is up (0.00032s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) |_http-server-header: Apache/2.4.29 (Ubuntu) |_http-title: HA: Dhanush MAC Address: 00:0C:29:22:66:8B (VMware) Device type: […]

HACKTHEBOX

Optimum (HACKTHEBOX)

root@kali:~/Downloads# nmap -A 10.10.10.8Starting Nmap 7.70 ( https://nmap.org ) at 2019-03-11 11:48 EDTNmap scan report for 10.10.10.8Host is up (0.14s latency).Not shown: 999 filtered portsPORT STATE SERVICE VERSION80/tcp open http HttpFileServer httpd 2.3|_http-server-header: HFS 2.3|_http-title: HFS /Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portAggressive […]

HACKTHEBOX

WALL – (HACKTHEBOX)

root@kali:~/Downloads# nmap -A 10.10.10.157 Now try to access http://10.10.10.157 root@kali:~/Downloads# gobuster dir -u http://10.10.10.157 -w /usr/share/wordlists/dirb/common.txt Now on browser http://10.10.10.157/monitoring Now on terminal root@kali:~/Downloads# curl -X POST http://10.10.10.157/monitoring/ Now on browser try to access http://10.10.10.157/centreon/ root@kali:~/Downloads# wfuzz -c -X POST -d “username=admin&password=FUZZ” -w ./darkweb2017-top10000.txt http://10.10.10.157/centreon/api/index.php?action=authenticate Back to portal Username : admin Password : password1 And […]