HTB AD Track: Sauna Walkthrough
文章描述了使用Nmap对目标机器进行扫描和端口枚举的过程,包括TCP SYN扫描、OS检测、漏洞扫描等步骤,并发现了开放的端口及其服务信息。 2025-10-10 11:2:28 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Param Dave

Hello Everyone!! Here’s my writeup for the machine Sauna.

Let’s start scanning and enumeration using Nmap.

Command: nmap -sS -T4 -A -p- -oA <output_file> <target-ip>

-sS: TCP SYN Scan

-T4: Faster scan time

-A: Enables OS and version detection, scans ports using common nmap scripts for specific vulnerabilities and performs traceroute.

-p-: Scan all 65535 ports

-oA: Save scan in 3 file formats (.nmap, .xml, .gnmap)

<output_file>: Replace with a file name of your choice

<target-ip>: Replace with the given IP address of the target machine

Following ports and services are discovered:

Press enter or click to view image in full size

Nmap Scan Results

We can start port-by-port enumeration.

Port 53: No results found using nslookup or dnsrecon

Port 80: Web Application running but other than team details, no other information found.

Port 135: msrpc anonymous login allowed but no interesting information obtained.

Port 389: EGOTISTICAL-BANK.LOCAL — Domain…


文章来源: https://infosecwriteups.com/htb-ad-track-sauna-walkthrough-9aa9048b45b7?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh