π€¨Whats Your Name?
License
0 - Introduction
1 - Port Scan
1a - Discovery
βββ(kaliγΏkali)-[~]
ββ$ sudo nmap -sS -T4 -p- 10.10.58.228
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-01 08:42 EEST
Nmap scan report for 10.10.58.228
Host is up (0.11s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
8081/tcp open blackice-icecap
Nmap done: 1 IP address (1 host up) scanned in 388.39 seconds1b - Versioning and OS fingerprinting
2 - Web server probing



3 - XSS
3a - Payload injection


3b - Cookie and location of mod




3c - Mod flag

4 - Probing WORLDWAP
4a - Change Password form

4b - Chat

5 - A closer look at the chat



6 - Finding the correct payload




7 - Getting the flag

Last updated