<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://toolaidback.github.io/</id><title>TooLaidBack's Blog</title><subtitle>A minimal, responsive and feature-rich Jekyll theme for technical writing.</subtitle> <updated>2023-09-19T06:34:42-04:00</updated> <author> <name>Isiah G</name> <uri>https://toolaidback.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://toolaidback.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://toolaidback.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator> <rights> © 2023 Isiah G </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>CozyHosting Writeup</title><link href="https://toolaidback.github.io/posts/CozyHosting-Writeup/" rel="alternate" type="text/html" title="CozyHosting Writeup" /><published>2023-09-15T00:00:00-04:00</published> <updated>2023-09-19T06:34:13-04:00</updated> <id>https://toolaidback.github.io/posts/CozyHosting-Writeup/</id> <content src="https://toolaidback.github.io/posts/CozyHosting-Writeup/" /> <author> <name>Isiah G</name> </author> <category term="htb" /> <category term="pentesting" /> <summary> Machine Info Name: CozyHosting Difficulty: Easy Network Scanning Nmap After we got the IP address of the target machine, we run nmap to scan all ports with version detection and script scanning. I used -T 4 here to scan the ports faster but in a real world environment I wouldn’t recommend scanning this fast as nmap might miss a port that was open. sudo nmap 10.10.11.230 -sC -sV -T 4 -p... </summary> </entry> </feed>
