amirr0r
Cancel

Foothold nmap scan $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Irked-full-port-scan.txt 10.10.10.117 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u...

Foothold nmap scan $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Networked-full-port-scan.txt 10.10.10.146 Nmap scan report for 10.10.10.146 Host is up (0.14s latency). Not shown: 65532 f...

Foothold nmap scan $ nmap -min-rate 5000 --max-retries 1 -sV -oN Bashed.txt 10.10.10.68 Warning: 10.10.10.68 giving up on port because retransmission cap hit (1). Nmap scan report for 10.10.10.68...

Foothold nmap scan (open ports) $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN SwagShop-full-port-scan.txt 10.10.10.140 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubun...

Foothold nmap scan (open ports) $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Valentine-full-port-scan.txt 10.10.10.79 Warning: 10.10.10.79 giving up on port because retransmission cap hi...

Foothold nmap scan (open ports) $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Nibbles-full-port-scan.txt 10.10.10.75 Warning: 10.10.10.75 giving up on port because retransmission cap hit ...

Foothold nmap scan $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Shocker-full-port-scan.txt 10.10.10.56 Nmap scan report for 10.10.10.56 Host is up (0.099s latency). Not shown: 65532 clo...

Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means “future” in Japanese. Nowadays it targets...

Foothold Nmap scan (open ports) $ nmap -min-rate 5000 --max-retries 1 -sV -sC -p- -oN Blocky-full-port-scan.txt 10.10.10.37 Nmap scan report for 10.10.10.37 Host is up (0.12s latency). Not shown:...

Foothold Nmap scan (open ports) FTP We can log in as anonymous: But there are no interesting files… Let’s check what we can enumerate on the other ports ! Samba I couldn’t get anything f...