

Faculty
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 10.10.11.169 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p -> All ports scan: Not shown: 64628 closed tcp ports (reset), 905 filtered tcp ports (no-response) Some close..
Read more

Shoppy
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 10.10.11.180 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,80,9093 10.10.11.180 -Pn -> All ports scan: Nmap scan report for 10.10.11.180 Host is up, received user-set..
Read more

Support
Information Gathering~/.profilemkt() { mkdir {nmap,exploits,tmp,content} } function extractPorts(){ ports="$(cat $1 | grep -oP '\d{1,5}/open' | awk '{print $1}' FS='/' | xargs | tr ' ' ',')" ip_address=&quo..
Read more

SSH Honeypot
SSH HoneypotConfiguration A VPS ( virtual private server ) apt install libssh-dev nano /etc/ssh/sshd_config change the port to: 2244 systemctl reload sshd git clone the PeteMo sshpot to the vps cd sshpot nano config.h modify the RSA_KEYFILE: ./honepot ssh-keygen -t rsa -b 2048 Save the key to: /root/sshpot..
Read more

Netgear Firmware
Firmware HackingNetgear Devices - Unauthenticated RCE https://www.exploit-db.com/exploits/45909 Lately, I’ve been getting passionate about hardware and IoT. So today I will present a small guide to get started in pentesting hardware, on camera systems. Firstly, we will download the firmware from the official website, some websites might not put the firm..
Read more

Trick
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv 10.10.11.166 -oG nmap/allPorts --defeat-rst-ratelimit command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,25,53,80 10.10.11.166 -Pn -> All ports scan: Nmap scan report for 10.10.11.166 Host is u..
Read more

Search
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 10.10.11.129 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p53,80,88,135,139,389,443,445,464,593,636,3268,3269,8172,9389,49667,49669,49670,49693,49702,49727 10.10.11.129 -Pn ..
Read more

ROCSC KOTH
- Tomato -Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv -Pn 164.90.170.107 -oG nmap/allPorts command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,1592,3479,5824 164.90.170.107 -Pn Host is up (0.096s latency). PORT STATE SERVICE VERSION 22&#..
Read more

Seal
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv 10.10.10.250 -oG nmap/allPorts --defeat-rst-ratelimit command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,443,8080 10.10.11.105 -Pn -oA nmap/full_scan -> All ports scan: Reason: 65529 rese..
Read more

Secret
Information GatheringNMAP command used: ( scanning for all the ports fast and efficient) sudo nmap -p- -sS --min-rate 5000 --open -T5 -vvv 10.10.11.120 -oG nmap/allPorts --defeat-rst-ratelimit command used: ( scanning the ports we got ) nmap -A -sC -sV -p22,80,3000 10.10.11.120 -Pn -oA nmap/full_scan -> All ports scan: Not shown: 65454 clo..
Read more