Skip to main content

Posts

Showing posts with the label Retired

Hackthebox.eu - Retired - Europa

Hackthebox.eu - Retired - Europa Recon As always I start with a simple UP/Down scan on all TCP ports. $ nmap -T4 -p- -oX ./nmapb.xml europa.htb Then I convert that to HTML to make it pretty xsltproc ./nmapb.xml -o ./nmapb.html Ports 22, 80 and 443 open.. Looks like this box is going to be mostly web based Let's run nmap again with the -A switch to run all scripts against these three ports $ nmap -T4 -A -p22,80,443 -oX ./nmapf.xtml europa.htb Then we will convert that output to HTML also xsltproc ./nmapf.xml -o ./nmapf.html Looks like we have an Ubuntu box running a fairly new version of OpenSSH on port 22 and Apache 2.4.18 on 80 and 443 Let's check out those Apache sites Both are just the default Apache install page Got a little bit more info from the certificate on 443 Europacorp.htb should be the box I ran a bunch of scans at these two domains Europa.htb europacorp.htb Tried Dirb and Dirbuster and didn't find anything…

HackTheBox -Retired - Postman

HackTheBox -Retired - Postman Recon: As always I start with a simple up/down scan on all TCP ports # nmap -T4 -p- -oX /root/Desktop/HTB/postman/nmapb.xml 10.10.10.160 Then I convert the XML to HTML Xsltproc /root/desktop/HTB/postman/nmapb.xml -o /root/Desktop/HTB/postman/nmapb.html Ok we see port 22,80,6379 and 1000 Lets scan just those ports with the -A to finger os/services Nmap -T4 -p 22,80, 6379,10000 -oX /root/Desktop/HTB/postman/nmapf.xml Convert that to html too Xsltproc /root/Desktop/HTB/postman/nmapf.xml -o /root/Desktop/HTB/postman/nmpaf.html Ok we got SSH (Openssh 7.6p1) on port 22 HTTP ( Apache 2.4.29) on port 80 REDIS ( 4.0.9) on 6379 WEBMIN (1.910) on 10000 Let's see what's running on port 80 Just a generic page with not much to poke at Let's run dirb at port 80 and see what we see It found some directories to poke around in /css /fonts /images /js and  /Uploads I really like finding dir's that are calle