Rabbit Store | TryHackMe Medium
通过对目标IP地址10.10.29.135进行Nmap扫描,发现开放端口80、22、4369和25672,并识别相关服务类型。 2025-5-20 04:47:45 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Error

FREE MEDIUM FRIEND FREE LINK

What is user.txt?

What is root.txt?

First of all we get a IP address so I preformed an NMAP scan discovering ports 80,22,4369, 25672 are open.

──(kali㉿kali)-[~]
└─$ nmap -p- -sVC -T4 -Pn 10.10.29.135 -v
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-19 08:43 EDT
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 08:43
Completed NSE at 08:43, 0.00s elapsed
Initiating NSE at 08:43
Completed NSE at 08:43, 0.00s elapsed
Initiating NSE at 08:43
Completed NSE at 08:43, 0.00s elapsed
Initiating SYN Stealth Scan at 08:43
Scanning cloudsite.thm (10.10.29.135) [65535 ports]
Discovered open port 22/tcp on 10.10.29.135
Discovered open port 80/tcp on 10.10.29.135
Discovered open port 25672/tcp on 10.10.29.135
Discovered open port 4369/tcp on 10.10.29.135
Completed SYN Stealth Scan at 08:44, 43.31s elapsed (65535 total ports)
Initiating Service scan at 08:44
Scanning 4 services on cloudsite.thm (10.10.29.135)
Completed Service scan at 08:46, 127.27s elapsed (4 services on 1 host)
NSE: Script scanning 10.10.29.135.
Initiating NSE at 08:46
Completed NSE at 08:46, 14.12s elapsed
Initiating NSE at 08:46
Completed NSE…

文章来源: https://infosecwriteups.com/rabbit-store-tryhackme-medium-f9f5069fbb50?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh