Home
JA.MESWOOLLEY.CO.UK
Cancel
Preview Image

HackTheBox: Haystack

The first step. As is almost always the case is to run an Nmap scan on the host to discover which services are running: root@kali:~/Documents/haystack# nmap -A -oN scan 10.10.10.115 Starting Nmap ...

Preview Image

HackTheBox: Writeup

this post describes the process of finding the user and root flags in HackTheBox Writeup machine. So as always start with an Nmap scan to discover which services are running. # Nmap 7.70 scan init...

Preview Image

HackTheBox: Luke

The first step, as always, Is to Nmap the host to identify running services: Nmap scan report for 10.10.10.137 Host is up (0.042s latency). Not shown: 65464 closed ports, 66 filtered ports PORT ...

Preview Image

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p-...

Preview Image

HackTheBox: Netmon

This is the second machine i have completed on HackTheBox. I started with the Access machine. So the first step to the perform an Nmap scan to see what kind of services the machine is running: nm...

Preview Image

HackTheBox: Access

I should preface this by saying that this machine took me about 6 hours to complete overall. I went down a couple of rabbit holes i didn’t need to go down and the final solution was much simpler th...

Preview Image

HackTheBox Invite Code

The following is a writeup on the process used to get the invite code for HackTheBox HackTheBox is a great website which contains pentesting labs to develop your security skillset. To create an ac...

Preview Image

nMap Visulisation

Introduction I have written a quick and dirty python script to visualise results from nMap and masscan. It works by parsing the XML log from a scan and generates a visual representation of the IP ...

Preview Image

Memcache Scanner Interactions

On the 5th March 2018 the worlds biggest DDOS attack was reported against a US based service provider. The DDos had a bandwidth of 1.7Tbps and was achieved using mis-configured Memcache servers. Me...

Preview Image

NTP Amplification Discovery

Introduction NTP amplification attacks are a form of DDOS which use NTP servers to turn small requests into large responses which can be directed to the victims computer. NTP amplification makes ...