Enumeration Nmap Based on the Nmap scan, it appears that the target has various TCP ports open, including 53 (DNS), 88 (Kerberos), 389 (LDAP), 445 (SMB), 1433 (MSSQL), and 5985 (WinRM). It’s worth noting that the target is a part of a domain called sequel.htb, and we can see a hostname for the domain controller… Continue reading Hack the Box: Escape
Month: July 2023
Hack the Box: Remote
Enumeration Nmap From the Nmap scan, we can see that the target has among other things TCP ports 21 (FTP), 80 (HTTP), 111 (RPC), and 445 (SMB) open. The target has a Windows operating system. From the Nmap’s script results, we can see that anonymous FTP login is allowed. FTP Successfully logged to the FTP… Continue reading Hack the Box: Remote