🪓
THM
  • Machines
    • Easy Machines
      • Pickle Rick
        • Findings Log
        • Scouting
          • URL Source Code
          • Wappalyzer
          • NMAP
        • Enumeration
          • Initial Enumeration
            • Gobuster
            • Open Port Vulnerability Check
            • Nikto
          • Portal Page Enumeration
        • Exploitation
          • SSH- Pointless
          • Command Panel
            • Python Webserver
            • Payloadallthethings
          • Cookies
        • Escalation
      • Basic Penetration Testing
      • OhSINT
      • Crack the hash
      • RootMe
      • Simple CTF
Powered by GitBook
On this page
  1. Machines
  2. Easy Machines
  3. Pickle Rick
  4. Scouting

NMAP

PreviousWappalyzerNextEnumeration

Last updated 2 years ago

  • Even though this is a web penetration test, I will go ahead and check nmap anyways to see what pops up. If anything for good practice.

  • Start with basic nmap scan:

    • nmap 10.10.72.153

    • Looks like the following ports are open:

      • 22

      • 80

    • Will check for all open ports

  • Next run an nmap scan on all ports to see what is open:

    • nmap -p- 10.10.72.153

    • Nothing new.

  • Run a more detailed scan to see what pops up:

    • nmap -sC -sV -p 80,22 10.10.72.153