Planning
This is a very simple machine, and each step is easy to see and think of. There is even a direct exploit script to get a shell in one click. This is a very simple machine, and each step is easy to see...
Total 115 reports , currently page 2 of 12 (10 per page)
This is a very simple machine, and each step is easy to see and think of. There is even a direct exploit script to get a shell in one click. This is a very simple machine, and each step is easy to see...
1, port scan and subdomain enumerate ``` 80/tcp http http-title: Voting System using PHP 443/tcp ssl/http 445/tcp SMB 3306/tcp mysql 5000/tcp http 768...
*1, Enumerate the port and services* ``` 22/tcp ssh 80/tcp http redirect to http://monitorsthree.htb/ ```
1,Recon port scan ``` PORT STATE SERVICE VERSION 80/tcp open http HttpFileServer httpd 2.3 |_http-title: HFS / |_http-server-header: HFS 2.3 Ser...
1, enumerate the ports and services 22/tcp ssh 80/tcp http 2222/tcp ssh(in this place, it would be wired)
1, enumerate ports and web-contents 22/tcp ssh 5000/tcp http `Werkzeug httpd 0.16.1 (Python 3.8.5)`
1, port scan and web-content enumerate 21/tcp ftp `ftp-anon: Anonymous FTP login allowed` 22/tcp ssh 135/tcp msrpc 443/tcp ssl http ``` ssl-cert: Subj...
1, nmap scan services and versions: 22/tcp ssh 80/tcp http 1337/tcp open waste
1,Recon port scan 53/tcp DNS 88/tcp kerberos-sec 135/tcp RPC 389/tcp ldap 445/tcp SMB 593/tcp ncacn_http 636,3269/tcp ssl/ldap 5985/tcp http ...
1,Enumerate (port) `nmap -sC -sV -Pn -p- 10.10.11.106` Firstly check the tcp ports: 80/tcp http `HTTP/1.1 401 Unauthorized\x0D` 135/tcp RPC 445/tcp ...