jamarir's blog
jamarir's blog
Follow
Follow
home
Offensive Security
HackTheBox
TryHackMe
VulnHub
CTF
newsletter
18 posts
@jamarir17
@jamarir
Sponsor & Support
jamarir's blog
Sponsor this blog
Enthusiast ethical hacker
Recent articles
[HackTheBox] dynstr
Jul 1, 2023
Footprinting Open ports Only SSH, DNS and HTTP services are running: kali@kali:~$ sudo nmap -sS -p- -Pn -v10 -oA syn_full 10.10.10.244 PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 63 53/tcp open domain syn-ack ttl 63 80/tcp open ht...
[Offensive Security] Proving Grounds - Tre
Jul 14, 2022
You probably do not want to climb this tre. Footprint Open ports The Nmap scan shows 3 open ports: kali@kali:~$ sudo nmap -v -sS -v -oA syn_full 192.168.198.84 PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 63 80/tc...
[Offensive Security] Proving Grounds - HAWordy
Jul 14, 2022
A beginner machine with multiple paths. Only local.txt and proof.txt are valid flags. Footprint Open ports Nmap scan: kali@kali:~$ sudo nmap -sS -Pn -v10 -p- -oA syn_full 192.168.207.23 PORT STATE SERVICE REASON 80/tcp open http syn-ack ttl 6...
[VulnHub] Web Machine: (N7)
Jul 11, 2022
Difficulty: Medium Using VirtualBox, we first make sure the kali and the target machines have a Host-only Adapter enabled. Host discovery Let's find out the target's IP through a network discovery: kali@kali:~$ fping -ag 192.168.56.0/24 2>/dev/null ...
Recent Sponsors
Be the first one to sponsor jamarir's blog
Become a sponsor