TryHackMe - Agent Sudo
Description Hello l33ts, I hope you are doing well. We are doing Agent Sudo from TryHackMe. We start off by a nmap scan where we find 3 open port, ftp-ssh-http. We brute force the user-agent...
Description Hello l33ts, I hope you are doing well. We are doing Agent Sudo from TryHackMe. We start off by a nmap scan where we find 3 open port, ftp-ssh-http. We brute force the user-agent...
Description Hello l33ts, I hope you are doing well. We will be doing Basic mission 10 from HackThisSite. Solution Let’s navigate to the challenge page. Here, we have nothing to work with,...
Description Hello l33ts, I hope you are doing well. We are doing Anonymous from TryHackMe Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target_...
Description Hello l33ts, I hope you are doing well. We will be doing Basic mission 9 from HackThisSite. Solution Let’s navigate the challenge page. In this level, the password is saved in...
Description Hello l33ts, I hope you are doing well. We will be doing Basic mission 8 from HackThisSite. Solution Let’s navigate to the challenge page. An unencrypted password file is stil...
Description Hello l33ts, I hope you are doing well. We are doing LazyAdmin from TryHackMe. We find a webserver running a vulnerable Enumeration nmap We start a nmap scan using the followi...
Description Hello l33ts, I hope you are doing well. We are doing Inclusion from TryHackMe. It’s an easy machine where we use local file inclusion vulnerability and find a user credentials th...
Description Hello l33ts, I hope you are doing well. We are doing Bounty Hacker from TryHackMe Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {tar...
Description Hello l33ts, I hope you are doing well. We will be doing Basic mission 7 from HackThisSite Solution Let’s navigate to the challenge page. With the script Sam has set up, we ca...
Description Hello l33ts, I hope you are doing well. We are doing Skynet from TryHackMe Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target_IP}...