Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • Popcorn

    Dec 16, 2020 TJNull's List

    Introduction: Recon 1# nmap -sS -sV -sC -Pn -T4 -oN popcorn.nmap.txt 10.10.10.6 2Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. 3Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-16 19:58 EST 4Nmap scan report for 10.10.10.6 5Host is up (0.024s latency). 6Not …

    Read More
  • Blocky

    Dec 13, 2020 Java phpmyadmin TJNull's list

    Introduction: This is one of the OSCP like machine from TJNull’s list and interesting one indeed. The exploitation and Privesc are relatively easier on this machine. When doing this machine, focus on doing good enumeration and pay attention to details. Examine user scripts and programs as they may lead you to …

    Read More
  • Bashed

    Dec 12, 2020 webshell TJNull's list

    This machine features a web application running a php web shell. This is a relatively simple machine w Recon Lets run the nmap scan. The ping probes are blocked so we will have to use the -Pn flag for the nmap scan. 1nmap -sS -sV -sC -T4 10.10.10.68 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-12 10:10 EST …

    Read More
  • Lame

    Dec 12, 2020 smb TJNull's list

    Introduction: This is a extremely simple machine based on a very old CVE (2007-2447) with SMB service and the exploit for this vulnerability is readily available at - https://www.exploit-db.com/exploits/16320/ . You can either do this machine with the metasploit module but since OffSec discourages the use of this in …

    Read More
  • Active

    Dec 10, 2020 TJNull's List

    Introduction: Recon 1# Nmap 7.91 scan initiated Fri Jan 1 16:49:57 2021 as: nmap -sS -sV -sC -T4 -O -oN nmap.active.txt 10.10.10.100 2WARNING: RST from 10.10.10.100 port 88 -- is this port really open? 3Nmap scan report for 10.10.10.100 4Host is up (0.015s latency). 5Not shown: 986 closed ports 6PORT STATE SERVICE …

    Read More
  • Arctic

    Dec 10, 2020 TJNull's List

    Introduction: Recon 1nmap -sS -sV -sC -T4 -O -oN nmap.arctic.txt 10.10.10.11 2Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-01 08:04 EST 3Nmap scan report for 10.10.10.11 4Host is up (0.014s latency). 5Not shown: 997 filtered ports 6PORT STATE SERVICE VERSION 7135/tcp open msrpc Microsoft Windows RPC 88500/tcp …

    Read More
  • bastard

    Dec 10, 2020 TJNull's List

    Introduction: Recon eneloop@kinetic:…/hackthebox/bastard/data$ sudo nmap -sS -sC -sV -O -T4 -oN nmap.bastard.txt 10.10.10.9 [sudo] password for eneloop: Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-17 23:32 EST Nmap scan report for 10.10.10.9 Host is up (0.016s latency). Not shown: 997 filtered ports PORT …

    Read More
  • Brainfuck

    Dec 10, 2020 TJNull's List NOSQL Injection Mongo SUID

    Introduction: Recon nmap scan - 1nmap -sS -sV -sC -T4 -Pn -oN brainfuck.nmap.txt 10.10.10.17 2Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. 3Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-14 22:07 EST 4Nmap scan report for 10.10.10.17 5Host is up (0.014s …

    Read More
  • bucket

    Dec 10, 2020 TJNull's List

    Introduction: Recon eneloop@kinetic:…/hackthebox/bucket/data$ sudo nmap -sS -sC -sV -T4 -O -oN nmap.bucket.txt 10.10.10.212 Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-02 21:35 EST Nmap scan report for 10.10.10.212 Host is up (0.014s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp …

    Read More
  • delivery

    Dec 10, 2020 TJNull's List

    Introduction: Recon nmap -sS -sC -sV -T4 -O -oN nmap.delivery.txt 10.10.10.222 Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-10 18:42 EST Nmap scan report for 10.10.10.222 Host is up (0.014s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol …

    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • »
    • »»

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved