hack_htb_legacy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
hack_htb_legacy [2020/11/07 00:04] – gman | hack_htb_legacy [2022/09/24 18:19] (current) – removed gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== HTB: Legacy ====== | ||
- | |||
- | IP: 10.10.10.4 | ||
- | Me: 10.10.14.25 | ||
- | |||
- | ===== Scan ===== | ||
- | |||
- | **Note:** masscan found a udp port that nmap did not. Remember to scan UDP! | ||
- | |||
- | ==== masscan ==== | ||
- | |||
- | **Scan Syntax:** | ||
- | < | ||
- | masscan 10.10.10.4 -p1-65535, | ||
- | # -p1-65535, | ||
- | # --rate=1000 | ||
- | # -e tun0 # listen on the VPN network interface for responses | ||
- | </ | ||
- | |||
- | **Results: | ||
- | < | ||
- | Starting masscan 1.0.5 (http:// | ||
- | -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth | ||
- | Initiating SYN Stealth Scan | ||
- | Scanning 1 hosts [131070 ports/host] | ||
- | Discovered open port 445/tcp on 10.10.10.4 | ||
- | Discovered open port 137/udp on 10.10.10.4 | ||
- | Discovered open port 139/tcp on 10.10.10.4 | ||
- | rate: 0.00-kpps, 100.00% done, waiting -308-secs, found=2 | ||
- | </ | ||
- | |||
- | ==== nmap ==== | ||
- | |||
- | Used nmap to scan the UDP port (-sU): | ||
- | |||
- | < | ||
- | |||
- | Results: | ||
- | |||
- | < | ||
- | Starting Nmap 7.80 ( https:// | ||
- | Nmap scan report for 10.10.10.4 | ||
- | Host is up (0.037s latency). | ||
- | |||
- | PORT STATE SERVICE | ||
- | 137/udp open netbios-ns | ||
- | |||
- | Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds | ||
- | |||
- | </ | ||
- | |||
- | |||
- | < | ||
- | |||
- | </ | ||
- | |||
- | |||
- | < | ||
- | |||
- | </ | ||
- | |||
- | |||
- | ===== Enumerate ===== | ||
- | |||
- | |||
- | ===== Exploit ===== | ||
- | |||
- | |||
- | ===== Post-Ex Enum ===== | ||
- | |||
hack_htb_legacy.1604707480.txt.gz · Last modified: by gman