The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


hack_htb_legacy

This is an old revision of the document!


HTB: Legacy

IP: 10.10.10.4 Me: 10.10.14.25

Scan

Note: masscan found a udp port that nmap did not. Remember to scan UDP!

masscan

Scan Syntax:

masscan 10.10.10.4 -p1-65535,U:1-65535 --rate=1000 -e tun0
# -p1-65535,U:1-65535 # scan all TCP/UDP ports
# --rate=1000         # scan rate = 1000 packets per second
# -e tun0             # listen on the VPN network interface for responses

Results:

Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-09-20 23:05:00 GMT
 -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth
Initiating SYN Stealth Scan
Scanning 1 hosts [131070 ports/host]
Discovered open port 445/tcp on 10.10.10.4
Discovered open port 137/udp on 10.10.10.4
Discovered open port 139/tcp on 10.10.10.4
rate:  0.00-kpps, 100.00% done, waiting -308-secs, found=2

nmap

Used nmap to scan the UDP port (-sU):

nmap -sU -p137 10.10.10.4

Results:

Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-20 18:14 CDT
Nmap scan report for 10.10.10.4
Host is up (0.037s latency).

PORT    STATE SERVICE
137/udp open  netbios-ns

Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds



Enumerate

Exploit

Post-Ex Enum

hack_htb_legacy.1604707480.txt.gz · Last modified: by gman