Nest
1,Recon Port scan 445/tcp SMB 4386/tcp unknown `Reporting Service V1.2`
Comprehensive writeups for HackTheBox machines across Easy, Medium, Hard, and Insane difficulties
Total 169 reports , currently page 10 of 17 (10 per page)
1,Recon Port scan 445/tcp SMB 4386/tcp unknown `Reporting Service V1.2`
1,Recon port scan ``` PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT | ftp-anon: A...
1,Recon port scan 22/tcp ssh `OpenSSH 7.4 (protocol 2.0)` 80/tcp http `Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)` web-content enumerate `/backup` a...
1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: ...
1, Port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3...
1, nmap scan 22/tcp ssh 80/tcp http 443/tcp ssl/http
1, Recon port scan 22/tcp ssh `OpenSSH 7.6p1 Ubuntu 4ubuntu0.3` 80/tcp http `Apache httpd 2.4.29` Page check ![](images/Pasted%20image%202024092011...
1,Recon port scan ``` PORT STATE SERVICE VERSION 80/tcp open http HttpFileServer httpd 2.3 |_http-title: HFS / |_http-server-header: HFS 2.3 Ser...
This Linux machine uses some of the latest vulnerabilities, but the symbolic link vulnerability used for privilege escalation will seriously damage the synchronous use of the machine. At the same time...
This is a very simple machine, and each step is easy to see and think of. There is even a direct exploit script to get a shell in one click. This is a very simple machine, and each step is easy to see...