Vulnversity
Learn about active recon, web app attacks and privilege escalation.
Task 1 - Deploy the machine
Task 2- Reconnaissance
┌──(abhinav㉿ETHICALHACKX)-[~]
└─$ nmap 10.10.157.204
Starting Nmap 7.94 ( https://nmap.org ) at xxxxxx IST
Nmap scan report for 10.10.157.204
Host is up (0.18s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3128/tcp open squid-http
3333/tcp open dec-notes
Nmap done: 1 IP address (1 host up) scanned in 16.04 seconds
Q. There are many Nmap "cheatsheets" online that you can use too.
Q. Scan the box; how many ports are open?
Q. What version of the squid proxy is running on the machine?
Q. How many ports will Nmap scan if the flag -p-400 was used?
Q. What is the most likely operating system this machine is running?
Q. What port is the web server running on?
Q. What is the flag for enabling verbose mode using Nmap?
Task 3 Locating directories using Gobuster
Q. What is the directory that has an upload form page?
Task 4 Compromise the Webserver
Last updated