Can you exfiltrate the root flag? Link to room is here . Our challenge here is to find 2 flags. Let’s start with enumerating the ip Use: nmap -sC -sV -A <machine_ip> We can see that port 22 and port 80 are open. Let’s go and check out what is there in the website since port 80 is open. It’s ...
What is google Dorking ? Google dorking is a method or technique used to find precise search results,but with a little creativity we can find all kinds of data exposed in the internet accidentally. This technique can also be used to get precise information on any topic while googling things. The first thing that a cyber security enthusiat thinks when ...
Blackfield is very well built AD machine. This machine will give the oppurtunity to learn about many different services used in AD. Let’s start with nmap scan After this i tried enumerating with enum4linux and smbclient. Smbclient is a tool used to access SMB resources on a server, much like an FTP client is used to access files. It offers a simple ...
Started with nmap scan nmap –sS –sV –T4 10.10.10.200 First I tried access the http port but nothing was rendering there. The port 873 is enabled here,rsync is a utility for efficiently transferring and synchronizing files between a computer and an external hard drive and across networked computers by comparing the modification times and sizes of files(souce google.com) rsync -v ...
About
Ehackify Cyber Security Research & Training company based in South India devoted to providing best-in-class ethical hacking and cybersecurity training to beginners as well as professionals looking for level-up..