🌄Valley
License
0 - Introduction
1 - Scanning
1a - Ports
1ai - Discovery
┌──(kali㉿kali)-[~]
└─$ sudo nmap -sS -p- 10.10.23.36
[sudo] password for kali:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-29 08:27 EEST
Nmap scan report for 10.10.23.36
Host is up (0.11s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
37370/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 577.97 seconds1aii - Versioning
1aiii - Checking for vulnerabilities
1b - Directory busting
1c - What we know so far:
2 - Manually exploring the webserver
2a - /static/00
2b - /dev1243224123123
2c - /dev1243224123123/devNotes37370.txt
2d - What we know so far
3 - FTP
4 - Wireshark analysis
5 - SSH - Part One
6 - valleyDev's enumeration for privesc
6a - Essential outputs from LinEnum
6b - What we know so far:
7 - The Cronjob - Part One
8 - Finding another path: Pivoting
8a - /home/valleyAuthenticator
8b - Investigating valleyAuthenticator
8bi - strings - Part One
8bii - strings - Part Two
9 - SSH - Part Two
10 - Enumerating (again)
11 - The Cronjob - Part Two
Last updated