First, I initiate our exploration with an Nmap scan. Port 25565 shows me there is a minecraft server. Then, i include “crafty.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.249 crafty.htb" >> /etc/hosts By visiting “crafty.htb”, i could find a minecraft introduction page. For connecting to the server. I need to download the minecraft client i..
First, I initiate our exploration with an Nmap scan. Then, i include “skyfall.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.254 skyfall.htb" >> /etc/hosts By visiting “skyfall.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “skyfall.htb” has. The “demo.skyfall.htb” was useful. I added it in ho..
First, I initiate our exploration with an Nmap scan. Then, i include “pov.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.251 pov.htb" >> /etc/hosts By visiting “pov.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “pov.htb” has. The “dev.pov.htb” was useful. I added it in hosts file too. There i..
First, I initiate our exploration with an Nmap scan. Then, i include “analysis.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.250 analysis.htb" >> /etc/hosts By visiting “analysis.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “analysis.htb” has. The “internal.analysis.htb” was useful. I added..
First, i include “nagios.monitored.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.248 nagios.monitored.htb" >> /etc/hosts I initiate our exploration with an Nmap scan. Also runned UDP scan. I have identified open port 80. Let’s access the site in a web browser for further exploration. I can not login with the crenditial from UDP scan result. ..
First, i include “bizness.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.252 bizness.htb" >> /etc/hosts I initiate our exploration with an Nmap scan. I have identified open port 80. Let’s access the site in a web browser for further exploration. Following an analysis of all pages, let’s initiate a directory search using dirsearch. Discovered ..
After starting the machine, I got the target's ip address(10.10.10.3). First, i scanned the open port in this machine by using nmap. I found that four TCP ports are open on the remote host. And also i can see that the ftp service's version is vsftpd 2.3.4. From using searchsploit to search about vsftpd 2.3.4's vuln. I found that there is a backdoor I could use. But it doesn't work. So i try to e..
After running the Kioptrix virtual machine, the IP address of the machine can be searched through the "netdiscover" that searches for the current network address. It shows that the machien's IP is 192.168.64.134. The result of the port scan for this IP is as follows. It can be seen that a total of six well-known ports have been opened. And i used enum4linux command to check credential informatio..
After running the Kioptrix virtual machine, the IP address of the machine can be searched through the "netdiscover" that searches for the current network address. It shows that the machien's IP is 192.168.64.133. The result of the port scan for this IP is as follows. It can be seen that a total of two well-known ports have been opened. Also i cound find a "phpmyadmin" in this host by using "nikt..
After running the Kioptrix virtual machine, the IP address of the machine can be searched through the "netdiscover" that searches for the current network address. It shows that the machien's IP is 192.168.64.132. The result of the port scan for this IP is as follows. It can be seen that a total of six well-known ports have been opened. Let's get into the 80 port. We can find a login page and usi..