old htb folders
This commit is contained in:
2023-08-29 21:53:22 +02:00
parent 62ab804867
commit 82b0759f1e
21891 changed files with 6277643 additions and 0 deletions

View File

@@ -0,0 +1,12 @@
# Nmap 7.93 scan initiated Tue Feb 28 12:05:41 2023 as: nmap -vv --reason -Pn -T4 -sV -p 88 --script=banner,krb5-enum-users --script-args krb5-enum-users.realm=escape.htb,userdb=/usr/share/seclists/Usernames/top-usernames-shortlist.txt -oN /home/simon/htb/escape/results/escape.htb/scans/tcp88/tcp_88_kerberos_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/tcp88/xml/tcp_88_kerberos_nmap.xml escape.htb
Nmap scan report for escape.htb (10.129.184.130)
Host is up, received user-set (0.24s latency).
Scanned at 2023-02-28 12:05:44 CET for 18s
PORT STATE SERVICE REASON VERSION
88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2023-02-28 19:05:47Z)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Feb 28 12:06:02 2023 -- 1 IP address (1 host up) scanned in 21.26 seconds

View File

@@ -0,0 +1,37 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.93 scan initiated Tue Feb 28 12:05:41 2023 as: nmap -vv -&#45;reason -Pn -T4 -sV -p 88 -&#45;script=banner,krb5-enum-users -&#45;script-args krb5-enum-users.realm=escape.htb,userdb=/usr/share/seclists/Usernames/top-usernames-shortlist.txt -oN /home/simon/htb/escape/results/escape.htb/scans/tcp88/tcp_88_kerberos_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/tcp88/xml/tcp_88_kerberos_nmap.xml escape.htb -->
<nmaprun scanner="nmap" args="nmap -vv -&#45;reason -Pn -T4 -sV -p 88 -&#45;script=banner,krb5-enum-users -&#45;script-args krb5-enum-users.realm=escape.htb,userdb=/usr/share/seclists/Usernames/top-usernames-shortlist.txt -oN /home/simon/htb/escape/results/escape.htb/scans/tcp88/tcp_88_kerberos_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/tcp88/xml/tcp_88_kerberos_nmap.xml escape.htb" start="1677582341" startstr="Tue Feb 28 12:05:41 2023" version="7.93" xmloutputversion="1.05">
<scaninfo type="syn" protocol="tcp" numservices="1" services="88"/>
<verbose level="2"/>
<debugging level="0"/>
<taskbegin task="NSE" time="1677582344"/>
<taskend task="NSE" time="1677582344"/>
<taskbegin task="NSE" time="1677582344"/>
<taskend task="NSE" time="1677582344"/>
<taskbegin task="SYN Stealth Scan" time="1677582344"/>
<taskend task="SYN Stealth Scan" time="1677582344" extrainfo="1 total ports"/>
<taskbegin task="Service scan" time="1677582345"/>
<taskend task="Service scan" time="1677582352" extrainfo="1 service on 1 host"/>
<taskbegin task="NSE" time="1677582352"/>
<taskend task="NSE" time="1677582362"/>
<taskbegin task="NSE" time="1677582362"/>
<taskend task="NSE" time="1677582362"/>
<host starttime="1677582344" endtime="1677582362"><status state="up" reason="user-set" reason_ttl="0"/>
<address addr="10.129.184.130" addrtype="ipv4"/>
<hostnames>
<hostname name="escape.htb" type="user"/>
<hostname name="escape.htb" type="PTR"/>
</hostnames>
<ports><port protocol="tcp" portid="88"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="kerberos-sec" product="Microsoft Windows Kerberos" extrainfo="server time: 2023-02-28 19:05:47Z" ostype="Windows" method="probed" conf="10"><cpe>cpe:/a:microsoft:kerberos</cpe><cpe>cpe:/o:microsoft:windows</cpe></service></port>
</ports>
<times srtt="241999" rttvar="241999" to="1209995"/>
</host>
<taskbegin task="NSE" time="1677582362"/>
<taskend task="NSE" time="1677582362"/>
<taskbegin task="NSE" time="1677582362"/>
<taskend task="NSE" time="1677582362"/>
<runstats><finished time="1677582362" timestr="Tue Feb 28 12:06:02 2023" summary="Nmap done at Tue Feb 28 12:06:02 2023; 1 IP address (1 host up) scanned in 21.26 seconds" elapsed="21.26" exit="success"/><hosts up="1" down="0" total="1"/>
</runstats>
</nmaprun>