Jan. 31, 2024, 1:24 p.m. | xocybersec

System Weakness - Medium systemweakness.com

Hacking, Misconfigured Permissions, Offsec

OffSec — Vegeta1 Walkthrough

A walkthrough with my tactics, techniques, and procedures.

Reconnaissance/Scanning:

Let’s start things off with a network scan to see which ports are open and the services running on each.

$ nmap -A -O -sC -sV -p- <machine_IP>
Nmap scan results

Using gobuster to scan for directories:

Scan results from gobuster

The robots.txt file shows:

robots.txt file contents

When visiting that directory there’s an html file.

/find_me directory contents

That html looks blank …

a network ethical hacking file gobuster hacking misconfigured network nmap offsec pentesting permissions ports procedures reconnaissance results robots robots.txt running scan scanning services start tactics techniques things txt walkthrough

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada