This was a pretty straightforward machine that required minimal alterations to the exploits - once you found them anyway :)Nmap scan shows only a few ports open:22/tcp open ssh syn-ack ttl
Chaos was a bit tricky for me but I learned some things which is always good :)Nmap results:PORT STATE SERVICE VERSION80/tcp open http Apache httpd 2.4.34 ((Ubuntu))|_http-server-header: Apache/
This was a fun box - I knew what LDAP was but had never really used it so it was cool to learn something. Nmap scan showed:22/tcp open ssh OpenSSH 7.
This was a pretty fun and straightforward little box and would be great practice for anyone studying for the OSCP.Nmap shows a few things running:PORT STATE SERVICE REASON VERSION22/tcp open
This was an awesome multi-layered machine that taught me a lot so I loved it! I'm sure there are easier, better and more efficient ways to complete this box but this is how