hack_htb_legacy
This is an old revision of the document!
Table of Contents
HTB: Legacy
IP: 10.10.10.4 Me: 10.10.14.25
Scan
Note: masscan found a udp port that nmap did not. Remember to scan UDP!
masscan
Scan Syntax:
masscan 10.10.10.4 -p1-65535,U:1-65535 --rate=1000 -e tun0 # -p1-65535,U:1-65535 # scan all TCP/UDP ports # --rate=1000 # scan rate = 1000 packets per second # -e tun0 # listen on the VPN network interface for responses
Results:
Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-09-20 23:05:00 GMT -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 445/tcp on 10.10.10.4 Discovered open port 137/udp on 10.10.10.4 Discovered open port 139/tcp on 10.10.10.4 rate: 0.00-kpps, 100.00% done, waiting -308-secs, found=2
nmap
Used nmap to scan the UDP port (-sU):
nmap -sU -p137 10.10.10.4
Results:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-20 18:14 CDT Nmap scan report for 10.10.10.4 Host is up (0.037s latency). PORT STATE SERVICE 137/udp open netbios-ns Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds
Enumerate
Exploit
Post-Ex Enum
hack_htb_legacy.1604707480.txt.gz · Last modified: by gman