VulnHub - Kioptrix #1
Description Hello hackers, I hope you are doing well. We are doing Kioptrix level 1 from VulnHub. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -p- ...
Description Hello hackers, I hope you are doing well. We are doing Kioptrix level 1 from VulnHub. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -p- ...
Description Reverse shells are used a lot for getting foothold on the target systems, but these reverse shells use a clear text-based communication which allows administrators monitoring...
Description Hello hackers, I hope you are doing well. We are doing HaskHell from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {targe...
Description Hello hackers, I hope you are doing well. We are doing CyberHeroes from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {ta...
Description Hello hackers, I hope you are doing well. We are doing NerdHerd from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {targe...
Description Hello hackers, I hope you are doing well. We are doing All in One from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {tar...
Description Hello hackers, I hope you are doing well. We are doing Smag Grotto from TryHackMe. On a webpage we find a pcap file that contains credentials for a login page, we use them to log...
Description Hello hackers, I hope you are doing well. We are doing Brute It from TryHackMe. This machine is running a webserver where we find a login page that we brute force and find a user...
Description Hello hackers, I hope you are doing well. We are doing Committed from TryHackMe. Solution After starting the machine, let’s unzip the file and enter the committed directory. ...
Description Hello hackers, I hope you are doing well. We are doing CMSpit from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target_...