The team is composed of 0xBlank, Pezzz and Steels, check the About us section for more informations. On this website you will find articles about :
- Our path to pentest/red-team certifications
- HackTheBox and CTF writeup
- Presentation of homemade tools
- Miscellaneous articles
Check out Flop.py Book a central repository of techniques, methodologies, and tools in several categories including Pentest, DFIR, OSINT & more !
Latest articles:
Recon nmap
1 2 3 4 5 6 7 └─$ rustscan -a 10.10.10.11 -b 2500 -- -T5 -Pn -sV -A PORT STATE SERVICE REASON VERSION 135/tcp open msrpc syn-ack Microsoft Windows RPC 8500/tcp open fmtp? syn-ack 49154/tcp open msrpc syn-ack Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows We face a Windows machine with only a rpc service and an unknown service on port 8500.
While browsing, I found that port 8500 as been assigned to Adobe ColdFusion.
Recon nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 └─$ nmap -T5 -p- -sV -A -Pn 10.10.10.184 PORT STATE SERVICE VERSION 21/tcp open ftp syn-ack Microsoft ftpd | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_02-28-22 07:35PM <DIR> Users | ftp-syst: |_ SYST: Windows_NT 22/tcp open ssh OpenSSH for_Windows_8.
SYNOPSIS Valentine is a very unique medium difficulty machine which focuses on the Heartbleed vulnerability, which had devastating impact on systems across the globe.
Recon nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 └─$ nmap 10.10.10.79 -T5 -p- -sV -A -Pn Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-15 12:53 CEST Warning: 10.10.10.79 giving up on port because retransmission cap hit (2).
Recon nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 └─$ nmap 10.10.11.104 -T5 -A -sV -p- Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-12 14:43 CEST Warning: 10.10.11.104 giving up on port because retransmission cap hit (2). Nmap scan report for 10.10.11.104 Host is up (0.034s latency). Not shown: 61881 closed tcp ports (conn-refused), 3652 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.
Recon nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 └─$ nmap -T5 -A -sV -p- -Pn 10.10.10.74 Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-10 16:01 CEST Warning: 10.10.10.74 giving up on port because retransmission cap hit (2).
Recon rustscan x nmap
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 └─$ rustscan -b 10000 -a 10.10.10.239 -- -T5 -A -sV -Pn .----. .-. .-. .----..---. .----. .