π¨Creative
License
0 - Introduction
1 - Scanning
1a - Nmap
1ai - Port Discovery
βββ(kaliγΏkali)-[~/Desktop]
ββ$ sudo nmap 10.10.194.114 -sS -T5 -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-22 10:11 EEST
Nmap scan report for 10.10.194.114
Host is up (0.11s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 130.06 seconds1aii - Versioning
1aiii - Checking for vulnerabilities
1aiv - OS Fingerprinting
1b - Directory busting

1c - Subdomain enumeration
1d - What we know so far
2 - beta.creative.thm
2a - First contact


2b - Python worker



2c - Internal Nmap and Proxy (kinda)





3 - Foothold using saad account
3a - Trying to login
3b - Cracking the passphrase
3c - Foothold
4 - PrivEsc
Last updated