Jan. 6, 2024, 1:43 p.m. | shiahalan

DEV Community dev.to




Introduction


This box introduces us to many basic concepts and tools used in ethical hacking. We explore using commands such as: ping, nmap, telnet, and more. For this box, to capture the flag we need to ultimately login to the telnet service running on the box in order to read the file containing the flag (flag.txt).





Enumeration


To start off, we ping (also known as an ICMP (internet control message protocol) echo test) the target box (computer) in order to …

basic box capture concepts ctf ethical ethical hacking file flag hacking hackthebox htb introduction login nmap order ping running service telnet tools txt ultimately write-up writeup

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States