Hack the Box Writeup: Netmon
Netmon was an easy and fun Windows machine. Nmap results: First thing I check is ftp to see if anonymous access is allowed. It is - with full access to the entire C:
Netmon was an easy and fun Windows machine. Nmap results: First thing I check is ftp to see if anonymous access is allowed. It is - with full access to the entire C:
Querier was a straightforward Windows machine which I think was a fairly realistic box you might find on a typical corporate network. Nmap scan: SMB is usually low-hanging fruit so I check out
This was a pretty straightforward machine that required minimal alterations to the exploits - once you found them anyway :) Nmap scan shows only a few ports open: > 22/tcp open ssh syn-ack ttl
Chaos was a bit tricky for me but I learned some things which is always good :) Nmap results: > PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.34 ((Ubuntu)) |_http-server-header:
The first version [https://t3chnocat.com/rubber-ducky-wifi-grabber/] of my Rubber Ducky script to exfil wifi passwords via POST dumped each wifi profile as a XML file then sent the desired fields as a
This was a fun box - I knew what LDAP was but had never really used it so it was cool to learn something. Nmap scan showed: > 22/tcp open ssh OpenSSH 7.