all InfoSec news
OffSec — Dawn Walkthorough
System Weakness - Medium systemweakness.com
Hacking, Misconfigured Permissions, Cronjobs
OffSec — Dawn Walkthrough
A walkthrough with my tactics, techniques, and procedures.
Reconnaissance/Scanning:
Let’s start things off with a network scan to see which ports are open and the services running on each.
$ nmap -A -O -sC -sV -p- <machine_IP>Nmap scan results.
Scanning for directories with Gobuster:
Contents of /logs directory:
Contents of /logs directory.I couldn’t view any except the management.log file. I’ll parse through that after I enumerate some more.
Enumerating …
a network cybersecurity directory gobuster hacking logs misconfigured network nmap offsec pentesting permissions ports privilege escalation procedures reconnaissance results running scan scanning services start tactics techniques things walkthrough