Posts

Showing posts from January, 2022

HackMyVM - Rubies

Image
  Rubies is a Medium difficulty machine that has some really useful techniques to understand. As always there are different methods to achieve the same outcome, this is just the way I did it. Find it └─ $ sudo netdiscover -r 10.0.0.0/24 -P | tee findit [sudo] password for kali:     _____________________________________________________________________________    IP             At MAC Address     Count     Len   MAC Vendor / Hostname         -----------------------------------------------------------------------------   10.0.0.1         08:00:27:95:67:5b       1       60   PCS Systemtechnik GmbH   10.0.0.113       08:00:27:95:1d:09       1       60   PCS Systemtechnik GmbH -- Active scan completed, 2 Hosts found.   Scan it └─ $ nmap -T4 -p- -sC -sV -oN nmap.out 10.0.0.113 # Nmap 7.91 scan initiated Thu Dec 30 09:38:13 2021 as: nmap -T4 -p- -sC -sV -oN nmap.out 10.0.0.113 Nmap scan report for 10.0.0.113 Host is up (0.00069s latency). Not shown: 65533 closed ports PORT   STATE

HackMyVM - Area51

Image
Area51 by bit is listed as medium difficulty, this is very subjective!!! It is difficult to find the correct request to get the initial foothold but subsequent steps are a bit more straight forwards. Find it └─ $ sudo netdiscover -r 10.0.0.0/24 -P | tee findit [sudo] password for kali:     _____________________________________________________________________________    IP             At MAC Address     Count     Len   MAC Vendor / Hostname         -----------------------------------------------------------------------------   10.0.0.1         08:00:27:96:87:13       1       60   PCS Systemtechnik GmbH   10.0.0.104       08:00:27:e9:7a:77       1       60   PCS Systemtechnik GmbH -- Active scan completed, 2 Hosts found. Scan it └─ $   nmap -T4 -p- -sC -sV -oN nmap.out 10.0.0.104 Starting Nmap 7.91 ( https://nmap.org ) at 2021-12-26 06:24 EST Nmap scan report for 10.0.0.104 Host is up (0.00072s latency). Not shown: 65532 closed ports PORT     STATE SERVICE     VERSION 22/tcp