Hack the Box Writeup: LaCasaDePapel
LaCasaDePapel was a little tricky for me because I had never seen one of the things needed to solve it (here's looking at you Psy Shell) and went down a rabbit hole... Nmap
A collection of 46 posts
LaCasaDePapel was a little tricky for me because I had never seen one of the things needed to solve it (here's looking at you Psy Shell) and went down a rabbit hole... Nmap
This was a fairly straightforward box that was good fun. Nmap scan: I checked out ftp first but anonymous access was disabled. Next up was smb: While enumerating, I found that the Development
Netmon was an easy and fun Windows machine. Nmap results: First thing I check is ftp to see if anonymous access is allowed. It is - with full access to the entire C:
Querier was a straightforward Windows machine which I think was a fairly realistic box you might find on a typical corporate network. Nmap scan: SMB is usually low-hanging fruit so I check out
This was a pretty straightforward machine that required minimal alterations to the exploits - once you found them anyway :) Nmap scan shows only a few ports open: > 22/tcp open ssh syn-ack ttl
Chaos was a bit tricky for me but I learned some things which is always good :) Nmap results: > PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.34 ((Ubuntu)) |_http-server-header: