Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • schooled

    Jul 5, 2021 TJNull's List

    Introduction: Recon NMAP scan 1root@kinetic:.../hackthebox/schooled/data# nmap -sC -sV -T4 -Pn -oN nmap.schooled.txt 10.10.10.234 2Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. 3Starting Nmap 7.91 ( https://nmap.org ) at 2021-07-05 12:37 EDT 4Nmap scan report …

    Read More
  • bastion

    Apr 15, 2021 TJNull's List

    Introduction: Recon 1eneloop@kinetic:.../hackthebox/bastion/data$ sudo nmap -sS -sC -sV -T4 -O -oN nmap.bastion.txt 10.10.10.134 2[sudo] password for eneloop: 3Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-15 20:57 EDT 4Nmap scan report for 10.10.10.134 5Host is up (0.086s latency). 6Not shown: 996 closed ports …

    Read More
  • jarvis

    Mar 28, 2021 TJNull's List

    Introduction: Recon Nmap scan 1eneloop@kinetic:.../hackthebox/jarvis/data$ sudo nmap -sS -sV -T4 -O -oN nmap.jarvis.txt 10.10.10.143 2[sudo] password for eneloop: 3Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-28 22:54 EDT 4Nmap scan report for 10.10.10.143 5Host is up (0.084s latency). 6Not shown: 998 closed …

    Read More
  • ready

    Mar 18, 2021 TJNull's List

    Introduction: Recon 1Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-18 20:57 EDT 2Nmap scan report for 10.10.10.220 3Host is up (0.15s latency). 4Not shown: 998 closed ports 5PORT STATE SERVICE VERSION 622/tcp open ssh OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0) 7| ssh-hostkey: 8| 3072 …

    Read More
  • swagshop

    Mar 13, 2021 TJNull's List

    Introduction: The swagshop machine presents a vulnerable Magento installation for which you may not look beyond basic enumeration and look up exploits once you have figured out the version. Recon NMAP Scan 1eneloop@kinetic:.../hackthebox/swagshop/data$ sudo nmap -sS -sC -sV -T4 -O -oN nmap.swagshop.txt 10.10.10.140 …

    Read More
  • Friendzone

    Feb 28, 2021 TJNull's List zone transfer python library hijack

    Introduction: Friendzone need a good amount of enumeration for the ports and services as there are many services running and many application endpoints that seem interesting at first and can lead to rabbit holes. The privesc involves library hijacking for a python library that is left unprotected with incorrect …

    Read More
  • irked

    Feb 27, 2021 TJNull's List

    Introduction: Recon 1eneloop@kinetic:.../hackthebox/irked/data$ sudo nmap -sS -sC -sV -T4 -O -oN nmap.irked.txt 10.10.10.117 2[sudo] password for eneloop: 3Sorry, try again. 4[sudo] password for eneloop: 5Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-27 15:56 EST 6Nmap scan report for 10.10.10.117 7Host is up …

    Read More
  • frolic

    Feb 22, 2021 TJNull's List

    Introduction: Recon 1eneloop@kinetic:.../hackthebox/frolic/data$ sudo nmap -sS -sV -sC -T4 -O -oN nmap.frolic.htb 10.10.10.111 2[sudo] password for eneloop: 3Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-22 20:48 EST 4Nmap scan report for 10.10.10.111 5Host is up (0.015s latency). 6Not shown: 996 closed ports …

    Read More
  • bounty

    Feb 17, 2021 TJNull's List

    Introduction: Recon eneloop@kinetic:…/hackthebox/bounty/data$ sudo nmap -sS -sV -T4 -O -oN nmap.bounty.txt 10.10.10.93 [sudo] password for eneloop: Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-17 19:46 EST Nmap scan report for 10.10.10.93 Host is up (0.014s latency). Not shown: 999 filtered ports PORT …

    Read More
  • Haircut

    Jan 7, 2021 TJNull's List webapp curl screen

    Introduction: Haircut is a very simple but great machine with a vulnerable app running that allows you to exploit curl to download a shell on the webserver and get the initial foothold. Recon NMAP scan 1nmap -sS -sV -sC -T4 -Pn -O -oN nmap.haircut.txt 10.10.10.24 2Host discovery disabled (-Pn). All addresses will be …

    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • »
    • »»

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved