hack_htb_legacy
This is an old revision of the document!
Table of Contents
HTB: Legacy
IP: 10.10.10.4 Me: 10.10.14.25
Scan
Note: masscan found a udp port that nmap did not. Remember to scan UDP!
masscan
Scan Syntax:
masscan 10.10.10.4 -p1-65535,U:1-65535 --rate=1000 -e tun0 # -p1-65535,U:1-65535 # scan all TCP/UDP ports # --rate=1000 # scan rate = 1000 packets per second # -e tun0 # listen on the VPN network interface for responses
Results:
Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-09-20 23:05:00 GMT -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 445/tcp on 10.10.10.4 Discovered open port 137/udp on 10.10.10.4 Discovered open port 139/tcp on 10.10.10.4 rate: 0.00-kpps, 100.00% done, waiting -308-secs, found=2
nmap
Enumerate
Exploit
Post-Ex Enum
hack_htb_legacy.1604707364.txt.gz · Last modified: by gman