host: * log# 2015/12/26 19:00 -> 19:40 (40min)# 2015/12/26 22:10 -> 23:50 (1hr 40min)# 2015/12/27 18:20 -> 18:40 (20min)# total time = 2hr 40min)* discovery - target* nmap --min-parallelism=100 -sP -T5* found:* discovery - services* nmap --min-parallelism=100 -A -T5 -p1-65535* found: port 22/tcp ssh, 3128/tcp squid, 8080/tcp ??* !!exploit-db did not reveal much* tried: nc -n -v 192.

Read More → fristileaks1.3

host: * log# 2015/12/24 14:45 -> 16:30 (1hr 45min)# 2015/12/25 15:00 -> 17:45 (2hr 45min)# total time = 4hrs 30min* discovery - target* nmap --min-parallelism=100 -sP -T5* found target:* discovery - services* nmap --min-parallelism=100 -A -T5 -p1-65535* found ports: 80* enumerate port 80* wget* cat index.html* wget* wget http://192.

Read More →

Metasploitable2 Walk-through

(This is an interim post and will be updated progressively. This notewill be removed once done.) This post extends the walk-though on the initial version ofMetasploitable at Itshould be noted that some commands and output may have been truncatedfor the purposes of brevity. Set-upThe set-up included two machines in a virtual test environment usingVirtualBox. The first was a Metasploitable virtual machine (VM) and thesecond a Kali 1.

Read More →