HackTheBox -Retired - Postman Recon: As always I start with a simple up/down scan on all TCP ports # nmap -T4 -p- -oX /root/Desktop/HTB/postman/nmapb.xml 10.10.10.160 Then I convert the XML to HTML Xsltproc /root/desktop/HTB/postman/nmapb.xml -o /root/Desktop/HTB/postman/nmapb.html Ok we see port 22,80,6379 and 1000 Lets scan just those ports with the -A to finger os/services Nmap -T4 -p 22,80, 6379,10000 -oX /root/Desktop/HTB/postman/nmapf.xml Convert that to html too Xsltproc /root/Desktop/HTB/postman/nmapf.xml -o /root/Desktop/HTB/postman/nmpaf.html Ok we got SSH (Openssh 7.6p1) on port 22 HTTP ( Apache 2.4.29) on port 80 REDIS ( 4.0.9) on 6379 WEBMIN (1.910) on 10000 Let's see what's running on port 80 Just a generic page with not much to poke at Let's run dirb at port 80 and see what we see It found some directories to poke around in /css /fonts /images /js and /Uploads I really like finding dir's that are calle
@circusmonkey404 on the twitters; DM for contact