Methodology [ nmap & Hydra ]

Live Hosts

getting target IP Address

scanning all TCP ports

more enumeration on unknown ports & FTP



brute force with hydra FTP


logging on FTP with acquired pass

downloading FLAG

MD5 & SHA sums for FLAG



Comments

Popular posts from this blog

Rabbit Virus

Hash functions

PLC vs RTU vs IED