First, I initiate our exploration with an Nmap scan. Port 25565 shows me there is a minecraft server. Then, i include “crafty.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.249 crafty.htb" >> /etc/hosts By visiting “crafty.htb”, i could find a minecraft introduction page. For connecting to the server. I need to download the minecraft client i..
First, I initiate our exploration with an Nmap scan. Then, i include “skyfall.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.254 skyfall.htb" >> /etc/hosts By visiting “skyfall.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “skyfall.htb” has. The “demo.skyfall.htb” was useful. I added it in ho..
First, I initiate our exploration with an Nmap scan. Then, i include “pov.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.251 pov.htb" >> /etc/hosts By visiting “pov.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “pov.htb” has. The “dev.pov.htb” was useful. I added it in hosts file too. There i..
First, I initiate our exploration with an Nmap scan. Then, i include “analysis.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.250 analysis.htb" >> /etc/hosts By visiting “analysis.htb”, i could not find anything useful information. So i runned gobuster to find which subdomain “analysis.htb” has. The “internal.analysis.htb” was useful. I added..
First, i include “nagios.monitored.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.248 nagios.monitored.htb" >> /etc/hosts I initiate our exploration with an Nmap scan. Also runned UDP scan. I have identified open port 80. Let’s access the site in a web browser for further exploration. I can not login with the crenditial from UDP scan result. ..
First, i include “bizness.htb” in my host file along with the machine’s IP address using the following command: echo "10.10.11.252 bizness.htb" >> /etc/hosts I initiate our exploration with an Nmap scan. I have identified open port 80. Let’s access the site in a web browser for further exploration. Following an analysis of all pages, let’s initiate a directory search using dirsearch. Discovered ..
After starting the machine, I got the target's ip address(10.10.10.3). First, i scanned the open port in this machine by using nmap. I found that four TCP ports are open on the remote host. And also i can see that the ftp service's version is vsftpd 2.3.4. From using searchsploit to search about vsftpd 2.3.4's vuln. I found that there is a backdoor I could use. But it doesn't work. So i try to e..