Tag: nmap

  • Prime: 1 – Walkthrough for OSCP Series

    Prime: 1 – Walkthrough for OSCP Series

    Prime: 1 is a challenging boot2root machine created by Suraj Pandey. It is designed for those who are preparing for the OSCP exam and is a great way to practice your penetration testing skills. In this blog post, I will walk you through the steps I took to root the machine, including: Performing a port…

  • Shell Scripting for Hackers

    Shell Scripting for Hackers

    Shell scripting is one of the very powerful language. There are many different kinds of shell scripting environment providing different features like Ksh, bash etc. In this article, we will be learning how to create scripts as a pen-tester / hacker/security researcher view. How scripting a little script can save your time. I’m providing here…

  • JIS-CTF- Jordan Infosec Capture The Flag Challenge – Walkthrough

    JIS-CTF- Jordan Infosec Capture The Flag Challenge – Walkthrough

    This article is a walk through on Jorder InfoSec CTF challenge: https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/ This is a basic web challenge consisting of 5 flags. I ran it on Virtualbox with bridged mode. This app doesn’t require kali os. You can do it on windows as well. To find the vulnerable machines through your attacking machine: http://www.anonhack.in/2018/06/part-2-finding-the-ip-address-of-your-victim-in-your-vmware-hacking-lab-network/ Let’s see the…

  • Quaoar CTF : WalkThrough

    Quaoar CTF : WalkThrough

    Quaoar is a CTF challenge for 2016. It is an easy challenge. You can download it in here: https://www.vulnhub.com/entry/hackfest2016-quaoar,180/ The Following article will show the walkthrough for Quaoar virtual machine challenge. Let’s start: I turned on the VMware and started Quaoar: The IP address for my Quaoar VM is 192.168.0.122. To find the vulnerable machines through…

  • Network Mapping

    Network Mapping is the technique through which you map the architecture of a network. It works simply that means after getting information from Whois database and Domain Name system, Its time when you know the ranges of IP addresses and confirming the “Live” targets. We find live targets with the help of ICMP port probes…