Files
CTF/HTB/encoding/results/report/report.md/10.129.123.2/Commands.md
Simon 82b0759f1e init htb
old htb folders
2023-08-29 21:53:22 +02:00

6.1 KiB

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -oN "/home/kali/htb/results/scans/_quick_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_quick_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN "/home/kali/htb/results/scans/_full_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_full_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -oN "/home/kali/htb/results/scans/_quick_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_quick_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN "/home/kali/htb/results/scans/_full_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_full_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -p 22 --script="banner,ssh2-enum-algos,ssh-hostkey,ssh-auth-methods" -oN "/home/kali/htb/results/scans/tcp22/tcp_22_ssh_nmap.txt" -oX "/home/kali/htb/results/scans/tcp22/xml/tcp_22_ssh_nmap.xml" 10.129.123.2

feroxbuster -u http://10.129.123.2:80/ -t 50 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x "txt,html,php,asp,aspx,jsp" -v -k -q -e -o "/home/kali/htb/results/scans/tcp80/tcp_80_http_feroxbuster_directory-list-2.3-medium.txt"

curl -sSikf http://10.129.123.2:80/.well-known/security.txt

curl -sSikf http://10.129.123.2:80/robots.txt

curl -sSik http://10.129.123.2:80/

nmap -vv --reason -Pn -T4 -sV -p 80 --script="banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)" -oN "/home/kali/htb/results/scans/tcp80/tcp_80_http_nmap.txt" -oX "/home/kali/htb/results/scans/tcp80/xml/tcp_80_http_nmap.xml" 10.129.123.2

curl -sk -o /dev/null -H "Host: IwDcITnyfroNmHvjuTwI.encoding.htb" http://encoding.htb:80/ -w "%{size_download}"

whatweb --color=never --no-errors -a 3 -v http://10.129.123.2:80 2>&1

wkhtmltoimage --format png http://10.129.123.2:80/ /home/kali/htb/results/scans/tcp80/tcp_80_http_screenshot.png

ffuf -u http://encoding.htb:80/ -t 10 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.encoding.htb" -fs 1999 -noninteractive -s | tee "/home/kali/htb/results/scans/tcp80/tcp_80_http_encoding.htb_vhosts_subdomains-top1million-110000.txt"

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -oN "/home/kali/htb/results/scans/_quick_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_quick_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN "/home/kali/htb/results/scans/_full_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_full_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -p 22 --script="banner,ssh2-enum-algos,ssh-hostkey,ssh-auth-methods" -oN "/home/kali/htb/results/scans/tcp22/tcp_22_ssh_nmap.txt" -oX "/home/kali/htb/results/scans/tcp22/xml/tcp_22_ssh_nmap.xml" 10.129.123.2

feroxbuster -u http://10.129.123.2:80/ -t 50 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x "txt,html,php,asp,aspx,jsp" -v -k -q -e -o "/home/kali/htb/results/scans/tcp80/tcp_80_http_feroxbuster_directory-list-2.3-medium.txt"

curl -sSikf http://10.129.123.2:80/.well-known/security.txt

curl -sSikf http://10.129.123.2:80/robots.txt

curl -sSik http://10.129.123.2:80/

nmap -vv --reason -Pn -T4 -sV -p 80 --script="banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)" -oN "/home/kali/htb/results/scans/tcp80/tcp_80_http_nmap.txt" -oX "/home/kali/htb/results/scans/tcp80/xml/tcp_80_http_nmap.xml" 10.129.123.2

curl -sk -o /dev/null -H "Host: CaVSHfCVQYqVqvUahOxO.haxtables.htb" http://haxtables.htb:80/ -w "%{size_download}"

whatweb --color=never --no-errors -a 3 -v http://10.129.123.2:80 2>&1

wkhtmltoimage --format png http://10.129.123.2:80/ /home/kali/htb/results/scans/tcp80/tcp_80_http_screenshot.png

ffuf -u http://haxtables.htb:80/ -t 10 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.haxtables.htb" -fs 1999 -noninteractive -s | tee "/home/kali/htb/results/scans/tcp80/tcp_80_http_haxtables.htb_vhosts_subdomains-top1million-110000.txt"

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -oN "/home/kali/htb/results/scans/_quick_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_quick_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN "/home/kali/htb/results/scans/_full_tcp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_full_tcp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN "/home/kali/htb/results/scans/_top_100_udp_nmap.txt" -oX "/home/kali/htb/results/scans/xml/_top_100_udp_nmap.xml" 10.129.123.2

nmap -vv --reason -Pn -T4 -sV -p 22 --script="banner,ssh2-enum-algos,ssh-hostkey,ssh-auth-methods" -oN "/home/kali/htb/results/scans/tcp22/tcp_22_ssh_nmap.txt" -oX "/home/kali/htb/results/scans/tcp22/xml/tcp_22_ssh_nmap.xml" 10.129.123.2

feroxbuster -u http://10.129.123.2:80/ -t 10 -w /root/.local/share/AutoRecon/wordlists/dirbuster.txt -x "txt,html,php,asp,aspx,jsp" -v -k -n -q -e -o "/home/kali/htb/results/scans/tcp80/tcp_80_http_feroxbuster_dirbuster.txt"

curl -sSikf http://10.129.123.2:80/.well-known/security.txt

curl -sSikf http://10.129.123.2:80/robots.txt

curl -sSik http://10.129.123.2:80/

nmap -vv --reason -Pn -T4 -sV -p 80 --script="banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)" -oN "/home/kali/htb/results/scans/tcp80/tcp_80_http_nmap.txt" -oX "/home/kali/htb/results/scans/tcp80/xml/tcp_80_http_nmap.xml" 10.129.123.2

curl -sk -o /dev/null -H "Host: JqivbBibaLLbuUZdVXDy.haxtables.htb" http://haxtables.htb:80/ -w "%{size_download}"

whatweb --color=never --no-errors -a 3 -v http://10.129.123.2:80 2>&1

wkhtmltoimage --format png http://10.129.123.2:80/ /home/kali/htb/results/scans/tcp80/tcp_80_http_screenshot.png

ffuf -u http://haxtables.htb:80/ -t 10 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.haxtables.htb" -fs 1999 -noninteractive -s | tee "/home/kali/htb/results/scans/tcp80/tcp_80_http_haxtables.htb_vhosts_subdomains-top1million-110000.txt"