all InfoSec news
OffSec — Vegeta1 Walkthrough
System Weakness - Medium systemweakness.com
Hacking, Misconfigured Permissions, Offsec
OffSec — Vegeta1 Walkthrough
A walkthrough with my tactics, techniques, and procedures.
Reconnaissance/Scanning:
Let’s start things off with a network scan to see which ports are open and the services running on each.
$ nmap -A -O -sC -sV -p- <machine_IP>Nmap scan results
Using gobuster to scan for directories:
Scan results from gobusterThe robots.txt file shows:
robots.txt file contentsWhen visiting that directory there’s an html file.
/find_me directory contentsThat html looks blank …
a network ethical hacking file gobuster hacking misconfigured network nmap offsec pentesting permissions ports procedures reconnaissance results robots robots.txt running scan scanning services start tactics techniques things txt walkthrough