HTB AD Track: Sizzle Walkthrough
文章描述了如何使用nmap进行全端口扫描并保存结果,通过Bash脚本过滤出开放端口,并生成列表用于后续攻击。 2025-9-18 07:36:16 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Param Dave

Hello Everyone! Here’s my writeup for the machine Sizzle.

Let’s perform a quick port scan of the target.

Command: nmap -p- <target-ip>

-p-: Scan all 65535 ports

<target-ip>: Replace with the given IP address of the target machine

Press enter or click to view image in full size

Port scan output

Save the obtained output to a file.

We will now filter this output to ensure that we only have the ports through some bash scripting.

Command: cat Open_Ports| grep open | cut -d “ “ -f 1 | cut -d “/” -f 1 > list_open_ports

Let’s understand the logic behind above command.

First we read the output of the file using cat command, pass this as input using pipe and grep the input to filter out only lines that contain the word ‘open’.

Next we pass this as input using pipe and divide it into columns with cut and space as the delimiter and select just the first column.

Finally, we pass this as input using pipe and divide it into columns with cut using slash as a delimiter and select just the first column.

Our filtered output should now only have the open ports.

Let’s now perform an aggressive scan on these ports.


文章来源: https://infosecwriteups.com/htb-ad-track-sizzle-walkthrough-1d0617b48932?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh