HackMyVm Momentum2 Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=Momentum2Scan ports. map -sV -sC -p- 192.168.56.99 -oN ports.log &n
Vulnhub Prime (2021): 2 Walkthroughhttps://www.vulnhub.com/entry/prime-2021-2,696/Scan ports. # Nmap 7.91 scan initiated Wed May 12 17:59:43 2021 as: nmap -sV -sC -p- -oN ports.log 192.168.33.139 Nmap scan report for 192.168.33.139 (192.168
HackMyVm Broken Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=BrokenScan ports. PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-hostkey: |
HackMyVm BlackWidow Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=BlackWidowNmap scan ports. nmap -sV -sC -p- -oN ports.log 192.168.56.100 Nmap scan report for 192.168.56.100 (192.168.56.100) &nbs
HackMyVm Deba Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=DebaScan ports, found 22, 80 and 3000 are open. # Nmap 7.91 scan initiated Fri May 14 08:30:51 2021 as: nmap -sV -sC -p- -oN ports.log 192.168.56.100 Nmap scan report for
HackMyVm Otte Walkthroughhttps://hackmyvm.eu/machines/machine.php?vm=OtteScan ports first. nmap -sV -sC -p- -oN ports.log 192.168.56.100 Nmap scan report for 192.168.56.100 (192.168.56.100) Host is up (0.00099s latency). Not shown
Vulnhub hacksudo: FOG Walkthroughhttps://www.vulnhub.com/entry/hacksudo-fog,697/Scan open ports. nmap -sV -sC -p- -oN ports.log 192.168.56.100 PORT STATE SERVICE VERSION &n
HackMyVm Driftingblues9 WalkthroughMachine can be download here: https://hackmyvm.eu/machines/machine.php?vm=Driftingblues9Nmap scan ports first, port 80 is open.Open port 80 in browser, it's a tiny blog.Check source code, we see the
https://www.vulnhub.com/entry/harrypotter-nagini,689/Very interesting machine, first time for me to do SSRF with Gopher.Nmap scan ports first.nmap -sV -sC -p- 192.168.56.99 -oN ports.logScan port 80, find note.txt
https://hackmyvm.eu/machines/machine.php?vm=FamilyNmap scan ports.Scan folder/files at port 80, only a wordpress folder.Check source code of wordpress/index.html, need to add family to /etc/hosts.Use wpscan to scan wordpress, but found no vulnerable