Methodology [ nmap & Hydra ]

Live Hosts

getting target IP Address

scanning all TCP ports

more enumeration on unknown ports & FTP



brute force with hydra FTP


logging on FTP with acquired pass

downloading FLAG

MD5 & SHA sums for FLAG



Comments

Popular posts from this blog

PLC vs RTU vs IED

Rabbit Virus

PKI [ Public key infrastructure ]