Nessus vulnerability scanner is one of the top scanners today and offers many options for personal and enterprise use. Here is a simple setup installing Nessus (free edition) in you Kali Linux instance.

Installation

First, head to https://www.tenable.com/products/nessus and download the latest version of Nessus Essentials.

Register for an activation code.


Disclaimer
This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Reconnaissance

First, let’s use the nmapAutomator to automate the process of recon/enumeration.

Summary of our nmap scan results:

---------------------Starting Nmap Basic Scan---------------------Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91…

Write-up on THM’s “Wreath” network.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Scenario

There are two machines on my home network that host projects and stuff I’m working on in my own time — one of them has a webserver that’s port forwarded, so that’s…


Write-up on THM’s machine “Blue”, Windows machine.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Reconnaissance

Used nmapAutomator to automate the process of recon/enumeration and here’s the summary of the output.

# Nmap 7.91 scan initiated Fri Jun  4 15:19:06 2021 as: /usr/bin/nmap -T4 --max-retries…

A simple guide on how to use Tor in Kali.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Why do we need to hide our traffic?

Regardless if you just started a path into ethical hacking, cyber security, or merely interested about browsing the Internet with…


My write-up on HTB’s retired machine “Remote”

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Preface

HTB’s “Remote” box just came out March 21 ’20 with the difficulty of 4 out of 10 per user’s ratings. Newly released system always gets pounded, race to get the first blood…


Write-up on THM’s machine “RA”, Windows Domain Controller.

Disclaimer

This document contains materials / information that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Story

You have gained access to the internal network of WindCorp, the multibillion dollar company, running an extensive social media campaign claiming to be unhackable (ha! …


Guide on configuring SSH Key-Based Authentication on a Linux Server

The basic SSH authentication on you Linux server is through username and password , however, even complex passwords are susceptible to “brute-force” type of attack. Here’s a simple guide on configuring SSH Key-Based authentication.

Typical SSH authentication

Using Putty SSH client for Windows OS.


My write-up on HTB’s retired machine “Curling”.

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Reconnaissance

Used nmapAutomator to automate the process of recon/enumeration and here’s the summary of the output.

--$/home/arcy24/Documents/tools/new/nmapAutomator/./nmapAutomator.sh 10.129.71.21 All

Running all scans on 10.129.71.21

Host is likely running Linux

---------------------Starting Nmap Quick Scan---------------------

Host discovery disabled (-Pn)…


Write-up on HTB’s retired machine “Arctic” that outlines manual exploitation.

Disclaimer

This site contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Persons accessing this information assume full responsibility for the use and agree to not use this content for any illegal purpose.

Reconnaissance

First, let’s use the nmapAutomator to automate the process of recon/enumeration.

Summary of our nmap scan results:

Running all scans on 10.10.10.11

Host is likely running Windows

---------------------Starting Nmap Quick Scan---------------------

Starting…

Arcy Caparros

InfoSec, Dad, Jack of All Trades and Master of None

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store