This write-up details the steps taken to compromise a "Footprinting Lab" machine, a medium-level challenge Nmap Fun: First, a regular nmap scan on 10.129.202.41 showed a bunch of open ports, including RPC, SMB, RDP (that's remote desktop!), and NFS....
thesword.hashnode.dev2 min read
No responses yet.