Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-07 15:20 +08 Nmap scan report for 10.10.10.161 Host is up (0.0087s latency). Not shown: 65511 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl … Continue reading service ports discover with nmap
Tag: nmap
[hackthebox]Silo
Introduction I attempted this retired machine without reading the htb guides, I went through a lot of rabbit holes and eventually found that the oracle tns port 1521 is the entry point. On testing the silo machine I found that it is susceptible to tns poisoning, searching on the web I found this invaluable article … Continue reading [hackthebox]Silo
[python]Automated process to look for hosts that are vulnerable to eternalblue
Disclaimer This code is meant for educational purpose only, you should be well aware that you must not in any case use the code to scan for vulnerable host in production, to test the code, please load in your VM and use host-only network interface to test and learn in a safe environment. All credits … Continue reading [python]Automated process to look for hosts that are vulnerable to eternalblue
[python]Intrusive python with nmap
So i was trying some simple script to invoke nmap with python. So here is a python command line version. The python script takes in two types of arguments: a. target host b. target port/ports. the port if more than one should separate by commas. The split method is called to put each port into … Continue reading [python]Intrusive python with nmap
[python]Intrusive python with nmap
Just got a new python-nmap installed, and nmap installed on my mac, did a small try out on manipulating the result. here's the code: I will be trying out the full scan capability with the codes, the above is just a try out... the actual usage would need to do some iteration with a for … Continue reading [python]Intrusive python with nmap
Security: nmap to test against my Linux Mint
At first I was using nmap to discover other virtual machines that were guest OS on my Linux Mint, however while scanning I discovered my host OS (Linux Mint) had opened ports which I did not have knowledge about and I did not need them at all. PORT STATE SERVICE 25/tcp open smtp 139/tcp open … Continue reading Security: nmap to test against my Linux Mint