Nov 21, 2025 · 2 min read · Initial Enumeration Nmap Scan Scanning for open ports and services: nmap -sS -sV -sC TARGET_IP Results: Port 80: HTTP Port 5000: HTTP (admin panel) Vulnerability Discovery Gobuster Enumeration Running directory brute force to discover hidden en...
Join discussionNov 21, 2025 · 4 min read · Initial Reconnaissance sudo nmap -sS -sV -T4 TARGET_IP -vvv Key Findings: HTTP service running FTP service running SSH service available Directory Discovery The main HTTP page showed Nicolas Cage content with limited information The directory b...
Join discussionNov 21, 2025 · 5 min read · Description Fred Flintstone & Barney Rubble! Barney is setting up the ABC web server and trying to use TLS certificates to secure connections, but he's having trouble. Here's what we know: nginx on port 80, redirecting to a custom TLS webserver on p...
Join discussionNov 21, 2025 · 5 min read · Initial Enumeration Nmap Port Scan Starting with a full port scan to identify all open services: sudo nmap -sS -T4 -p- TARGET_IP Service Version Detection Once ports are identified, scanning for service versions and running default scripts: sudo nma...
Join discussionOct 9, 2025 · 4 min read · Enumeration sudo nmap -sT -sV -A -p- 10.10.134.123 -oN enum.txt Result: Nmap scan report for 10.10.134.123 Host is up (0.20s latency). Not shown: 65532 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0...
Join discussion
Sep 16, 2025 · 3 min read · Enumeration nmap -sV -sT -A -p- 10.10.255.113 Result: # Nmap 7.93 scan initiated Tue Sep 16 16:26:27 2025 as: nmap -sV -sT -A -p- -oN enum.txt 10.10.255.113 Nmap scan report for ip-10-10-255-113.eu-west-1.compute.internal (10.10.255.113) Host is up ...
Join discussion
Jun 15, 2025 · 4 min read · Hello everyone, after a long time, I am writing this writeup on this CTF from TryHackMe. Step 1: Port Scanning Use nmap or rustscan to scan for open ports. ┌──(kali㉿kali)-[~] └─$ nmap -sCV -Pn 10.10.191.158 Starting Nmap 7.95 ( https://nmap.org ) at ...
Join discussionJun 10, 2025 · 2 min read · Scenario Overview An alert has been triggered: "The threat research team discovered a suspicious domain that could be a potential threat to the organisation." The case was assigned to you. Inspect the provided teamwork.pcap located in ~/Desktop/exerc...
Join discussion