Home
root@g2jz:~#
Cancel

Backdoor Write-up

Enumeration OS Detection In order to identify the machine that we are dealing with, we will perform an OS detection. This can be done very simply, as the TTL (Time To Live) of a ping response ca...

Scrambled Write-up

Enumeration OS Detection In order to identify the machine that we are dealing with, we will perform an OS detection. This can be done very simply, as the TTL (Time To Live) of a ping response ca...

Cap Write-up

Enumeration OS Detection In order to identify the machine that we are dealing with, we will perform an OS detection. This can be done very simply, as the TTL (Time To Live) of a ping response ca...

Knife Write-up

Enumeration Nmap First, we will start scanning the target machine. To do this, we will use nmap. The scan will filter the open ports in all the port range and will use the TCP Syn Port Scan. Opt...

Explore Write-up

Enumeration Nmap The first thing we will do is enumerate the open ports on the target machine. To do this, we are going to be using nmap. The type of scan that we are going to use scans all the ...

Love Write-up

Enumeration Nmap As always, we will start by enumerating the ports on the target machine. To do this, we will use our beloved nmap. The scan that we will be using scans all the port range, displ...

BountyHunter Write-up

Enumeration Nmap First, we will start enumerating the open ports on the victim machine. To do that, we will use nmap. We will specify that we want to scan all the port range, that we only want t...

whoami

I’ve been an enthusiast of technology since I was a child. I remember my first days with a computer, trying to explore every nook of the Operating System (it was Windows 2000) in the after-school c...