IP -> 10.10.11.166 Let’s start with an nmap scan As we can see we have ports 22, 25, 53 and 80 running SSH, SMTP, DNS and HTTP respectively.Since we have…
IP -> 10.10.11.149 We start off with an nmap scan Alright! We have port 22 running SSH, port 80 running HTTP, and port 443 running HTTPS. When we access the…
We start with an nmap scan! We got the following ports open. 21 running FTP, 22 running SSH, 80 running HTTP, 443 running HTTPS, 8000 running HTTP, 8096 running an…
We start with an nmap scan We have two ports open. 22 running SSH and 80 running HTTP!Let’s access the website: Let’s try and sign up! Okay, so we cannot…
We start the VM and connect to the machine via tryhackme’s VNC service.We encounter a file in /home/ubuntu/mrphisher/MrPhisher.docm We open this file in openoffice Writer and edit the macros. Looking…
IP -> 10.10.11.160 We start with an nmap scan! We have three ports open. port 21 running FTP, port 22 running SSH and port 5000 running a python HTTP app.Let’s…
IP -> 10.10.11.146 We start with an nmap scan We see port 80 running HTTP and 22 running SSH. Let’s see whats in the website. Clicking on the button “store”…
IP -> 10.10.11.164 First we run a nmap scan: “nmap -p- -v -sCV 10.10.11.164” We see that this computer is running ssh on port 22, HTTP on port 80, and…
IP -> 10.10.11.156 We start by running an nmap scan “nmap -p- -v -sCV 10.10.11.156” We only have two services running, ssh and HTTP. Let’s check the site. Looking through…
IP -> 10.10.11.152 We start by running nmap. We see some services running for what looks like to be an AD environment because of Kerberos and LDAP. We also have…