

Shoppy
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 10.10.11.180 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,80,9093 10.10.11.180 -Pn -> All ports scan: Nmap scan report for 10.10.11.180 Host is up, received user-set..
Read more

Support
Information Gathering~/.profilemkt() { mkdir {nmap,exploits,tmp,content} } function extractPorts(){ ports="$(cat $1 | grep -oP '\d{1,5}/open' | awk '{print $1}' FS='/' | xargs | tr ' ' ',')" ip_address=&quo..
Read more

Trick
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv 10.10.11.166 -oG nmap/allPorts --defeat-rst-ratelimit command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,25,53,80 10.10.11.166 -Pn -> All ports scan: Nmap scan report for 10.10.11.166 Host is u..
Read more

Horizontall
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 10.10.11.105 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,80 10.10.11.105 -Pn -oA nmap/full_scan -> All ports scan: Not shown: 65527 closed ports, 6 filtered po..
Read more