Hack The Box | Devvortex Writeup
The Machine IP address (victim) : 10.129.229.146 added it as part of the hosts file by echo "10.129.229.146 devvorotex.htb" >> /etc/hosts Enumeration: Port Scan: As always my first a...
The Machine IP address (victim) : 10.129.229.146 added it as part of the hosts file by echo "10.129.229.146 devvorotex.htb" >> /etc/hosts Enumeration: Port Scan: As always my first a...
Summary: Port Scan: Lets start with nmap scan to discover some open ports. # Nmap 7.80 scan initiated Tue Jan 30 21:27:02 2024 as: nmap -A -T5 -sV -Pn -oA 10.129.28.48 10.129.28.48 Nmap scan repo...
Introdution Nmap, also known as the Network Mapper, is a free and open-source tool that helps IT professionals uncover the secrets of their network as well as for security auditing. It is like a fl...
Summary: Analytics is a vulnerable Linux machine on HackTheBox. Basic web enumeration techniques expose a login page on a Metabase subdomain. This subdomain is exploitable through a known vulnerab...
Summary: Manager, a medium difficulty Windows machine, acts as a domain controller with Active Directory and additional services like a web server and an SQL server. The attack starts by exploiti...
Summary: Builder, is a medium-difficulty Linux machine, runs a Jenkins instance. The attacker finds a vulnerability (CVE-2024-23897) in Jenkins, allowing unauthorized access to read files on the sy...
The Machine IP address (victim): 10.129.229.88 Enumeration: Port Scan Lets take the first step with nmap scan nmap -sV -A -T5 -oA 10.129.229.88 10.129.229.88 # Nmap 7.80 scan initiated Mon Jan ...
The Machine IP address (victim): 10.129.27.235 Enumeration: Port Scan # Nmap 7.80 scan initiated Tue Jan 30 20:01:25 2024 as: nmap -sV -A -T5 -Pn -oA 10.129.27.235 10.129.27.235 Nmap scan report...
The Machine IP address (victim): 10.129.27.9 Enumeration: Port Scan Lets take the first step with nmap scan nmap -sV -A -T5 10.129.27.9 -oA 10.129.27.9 # Nmap 7.94SVN scan initiated Fri Feb 2 ...
If you’re utilizing SSH for device access, is it secure? The questions you may ask yourself: is your SSH login robust? Are default accounts in use? Is your device exposed to the internet, potential...