Search by Tag

Lag-and-Crash-2.0
25 March 2022

Escape From Gulag

### Upon connecting to the server, I can see that I have to select a shell. However, most of the...

pwn
Lag-and-Crash-2.0
25 March 2022

We Need Flash

### Upon connection, I got the following message from the server. So, there will be a test I have to...

pwn
Lag-and-Crash-2.0
26 March 2022

Lag and Crash 2.0

Web Hacking Fundamentals
16 August 2021

Pickle_rick

First a nmap scan was conducted to determine the running services on the machine. Turns out it was running apache (web service) and SSH

nmap -sV -sC 10.10.11.43

Image

web
Web Hacking Fundamentals
16 August 2021

Web Hacking Fundamentals

General
17 August 2021

Simple_ctf

An nmap scan was conducted on the machine and results shown that few services were running which included ftp, apache & ssh

nmap -sV -sC 10.10.82.183

Image

security, enumeration, privesc
General
19 August 2021

Ice

A simple nmap scan was conducted on the machine. Interesting services like rdp, http were running. Something eye catching was found where a service called icecast was running for http

nmap -sV -sC 10.10.7.18

Image

windows, mimikatz, metasploit
Advanced Exploitation
20 August 2021

Steel_mountain

A basic nmap scan was conducted on the machine and results show that web service is running on port 80 & 8080. RDP service is also running

nmap -sV -sC 10.10.242.206

Image

windows, powershell
Advanced Exploitation
28 August 2021

Alfred

A simple nmap scan was conducted on the machine. Turns out it is running a website on port 80 and 8080. Also running RDP on port 3389

jenkins, windows_tokens
General
29 August 2021

Rootme

Nmap scan shows that ssh and apache services are running

web, linux, privilege-escalation
General
01 December 2021

Agent_sudo

Basic nmap scan results show that, the machine is running 3 services: ssh, ftp, http

enumeration, brute-force
General
01 December 2021

General

Advanced Exploitation
06 December 2021

Hackpark

A simple nmap scan was conducted on the machine. Turns out it is running a website

web, windows
Advanced Exploitation
06 December 2021

Advanced Exploitation

Basic Exploitation
30 January 2022

Game_zone

A rust scan was used to conduct a speed scan on the IP and pipe the open ports to conduct a nmap scan. From what it shows, ports 22 and 80 are open

SQLi, RCE
Basic Exploitation
30 January 2022

Basic Exploitation

Offensive Pentesting
31 January 2022

Daily_bugle

Rust Scan scanning tool was used to enumerate the running services on the server. Turns out it has SSH, Web service Joomla and MySQL Database running

SQLi, joomla, RCE
Offensive Pentesting
02 February 2022

Relevant

Rust Scan scanning tool was used to enumerate the running services on the server. From the ports that look open, it looks like this is a windows machine. This is confirmed with the Nmap results we got

windows, smb, SeImpersonatePrivilege
Offensive Pentesting
02 February 2022

Offensive Pentesting