10.129.11.235

Open Ports TCP

22 - ssh

80 - http

  1. We first scan our target with nmap using on default scripts, we get
nmap -sC -v 10.129.11.235

image.png

We get only 2 Open ports on the target

  1. We then do a all ports scan using nmap to see if there are any other ports open on the target and we get nothing
nmap -sC -p- -v 10.129.11.235 
  1. We then do Service Enumeration on the target and get the same results

image.png

  1. Now we will perform directory busting using gobuster
gobuster dir -u <http://gettingstarted.htb> -w /usr/share/seclists/Discovery/Web-Content/common.txt