<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Justin Lawitz' Blog]]></title><description><![CDATA[Unlocking Cybersecurity Insights, One Hack at a Time]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/blog</link><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 03:17:19 GMT</lastBuildDate><atom:link href="https://justinblawitz.wixsite.com/hackthebox-cybersecu/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Vaccine - Linux]]></title><description><![CDATA[Ping  and Nmap  the target IP using sudo nmap -sC -sV {target IP} We find 3 open ports, port 22/tcp open running vsftpd, port 22/tcp open running OpenSSH, and port 80/tcp open running Apache httpd. In the Nmap scan we see that Anonymous FTP login is allowed on port 21, we can connect to it using ftp {target IP}  with the username anonymous  and the password anon123 Looking through the FTP server using dir , we find a file called backup.zip . We can download this file to our system using get...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/vaccine-linux</link><guid isPermaLink="false">69113f02d588c50c0e5ed265</guid><pubDate>Mon, 10 Nov 2025 01:33:14 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_d58501a668f64076b6354dde9ec73825~mv2.png/v1/fit/w_302,h_130,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Oopsie - Linux]]></title><description><![CDATA[First ping  and Nmap  the target IP using nmap -sC -sv {target IP} We find 2 open tcp ports, 22 running OpenSSH, and 80 running an Apache server, we’ll mainly be looking into port 80 or the web server. To begin looking into the web server, we’ll search the target IP in a browser  and find a web page for an automotive business After scrolling to the services section, we find some explanation that we need to login to gain access to their services. With this information, we can deduce that there...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/oopsie-linux</link><guid isPermaLink="false">69055797c8a1fe1c55f7ebea</guid><pubDate>Sat, 01 Nov 2025 00:50:06 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_3e91d4a3540447718dac105531977f69~mv2.png/v1/fit/w_305,h_135,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Archetype - Windows]]></title><description><![CDATA[Ping  and nmap  the target IP using nmao -sC -sV {target IP} The main port we’ll be working with is port 1433/tcp open running Microsoft SQL server 2017. We can look more into this SMB using smbclient, specifically smbclient -N -L \\\\{target IP}\\ , where -N specifies no password, and -L specifies what services are available on a server. Looking at the shares available, only the backups share is available that doesn’t require an administrator level of permissions, so we’ll enter it using...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/archetype-windows</link><guid isPermaLink="false">68fd18584cd3f117277b7df3</guid><pubDate>Sat, 25 Oct 2025 18:45:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_5c137db941384b1484b9687304bed546~mv2.png/v1/fit/w_316,h_140,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Tactics - Windows]]></title><description><![CDATA[Ping  and Nmap  the target Ip using sudo nmap -sC -Pn {target Ip}  where -Pn treats all hosts as online and skips the host discovery phase which is essentially a complex ping scan. This type of scan is often blocked by firewalls as it is a nonstandard connection request or scan attempt We find 3 open ports in the scan, port 135/tcp running msrpc, which is a remote procedure call (RPC) that supports communication between Windows applications. RPC is a low-level form of inter-process...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/tactics-windows</link><guid isPermaLink="false">68f019fe27064b4fa4496752</guid><pubDate>Wed, 15 Oct 2025 22:05:55 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_36eb8331b8224a61beca64125baf0471~mv2.png/v1/fit/w_316,h_128,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Pennyworth – Linux]]></title><description><![CDATA[Ping  and Nmap  the target Ip using sudo nmap -sC -sV {target Ip} We find port 8080/tcp open running Jetty version 9.4.39.v20210325. Since it is an http server, we’ll search the target Ip  in our browser, but we’re given an error. This error is because we need to specify which port the service is running on as it isn’t running on port 80, to do this we’ll search http://{target Ip}:8080/  where we got the port number from the Nmap scan. We find a login page for a service called Jenkins, which...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/pennyworth-linux</link><guid isPermaLink="false">68eea8187e7b272d1ee5dcee</guid><pubDate>Tue, 14 Oct 2025 19:46:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_998f4b0ef0ae48709890b694ed92eee5~mv2.png/v1/fit/w_337,h_131,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Funnel - Linux]]></title><description><![CDATA[Ping  and Nmap  the target Ip using sudo nmap -sC -sV {target Ip} We find 2 open tcp ports, port 21/tcp open running vsftp 3.0.3, and...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/funnel-linux</link><guid isPermaLink="false">68e5f928a062988b03743c5d</guid><pubDate>Wed, 08 Oct 2025 05:45:48 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_d175d2a803114714bc447405df8347b0~mv2.png/v1/fit/w_302,h_133,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Bike - Linux]]></title><description><![CDATA[Ping  and Nmap  the target Ip using nmap -sC -sV -v {target Ip} , where -v causes Nmap to print more information about the scan in...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/bike-linux</link><guid isPermaLink="false">68e5f83aff64b90438056de4</guid><pubDate>Wed, 08 Oct 2025 05:38:49 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_477d1a7a75c24c50bda319d157de7538~mv2.png/v1/fit/w_312,h_133,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Ignition - Linux]]></title><description><![CDATA[Ping  and Nmap  the server using sudo nmap -sC -sV {target Ip} We see port 80/tcp open running an http server. We also see a line...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/ignition-linux</link><guid isPermaLink="false">68e5f7035410b45ad9aaf7ee</guid><pubDate>Wed, 08 Oct 2025 05:34:02 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_a5dfbe81fa6342d390c2e77d19827576~mv2.png/v1/fit/w_312,h_135,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Three - Linux]]></title><description><![CDATA[First ping  and Nmap  the target Ip using sudo nmap -sV {target Ip} We find port 22/tcp open, and port 80/tcp open running a web server....]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/three-linux</link><guid isPermaLink="false">68e5f3afa062988b037432bb</guid><pubDate>Wed, 08 Oct 2025 05:22:35 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_bf49e5a58cc942718ccc99a858f3a4d8~mv2.png/v1/fit/w_315,h_130,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Responder - Windows]]></title><description><![CDATA[Ping  and Nmap  the target Ip using nmap -p- --min-rate 1000 -sV {target Ip} We find port 80/tcp open running an Apache web server, and...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/responder-windows</link><guid isPermaLink="false">68e5f22b335b984f1adbea7b</guid><pubDate>Wed, 08 Oct 2025 05:15:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_8d2a8e43d97c40d69c9b4375d82860ff~mv2.png/v1/fit/w_331,h_131,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Crocodile - Linux]]></title><description><![CDATA[Ping  and Nmap  the target Ip using sudo nmap -sC -sV {target Ip} We find port 21/tcp open FTP server, and port 80/tcp open http server...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/crocodile-linux</link><guid isPermaLink="false">68e5f0df5410b45ad9aaed69</guid><pubDate>Wed, 08 Oct 2025 05:09:05 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_88d68b1a16664507ba6110c95a1b5d8b~mv2.png/v1/fit/w_321,h_136,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Sequel - Linux]]></title><description><![CDATA[Ping  and Nmap  the target Ip using sudo nmap -sC -sV {target Ip} We find port 3306/tcp open running MySQL 5.5.5-10.3.27-MariaDB0+deb10u1...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/sequel-linux</link><guid isPermaLink="false">68e5efefa062988b03742c09</guid><pubDate>Wed, 08 Oct 2025 05:02:52 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_dda5b0a74e6c4e99b71894f5466579f6~mv2.png/v1/fit/w_310,h_133,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Appointment - Linux]]></title><description><![CDATA[We start by running ping  and nmap  using sudo nmap -sC -sV {target Ip}  where -sC preforms a script scan using the default set of...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/appointment-linux</link><guid isPermaLink="false">68e5ee52335b984f1adbe34b</guid><pubDate>Wed, 08 Oct 2025 04:58:33 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_32215e49aff24b07b55ea437f5fde912~mv2.png/v1/fit/w_313,h_132,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Synced - Linux]]></title><description><![CDATA[Ping  and nmap  target Ip, sudo nmap -p- --min-rate=1000 -sV {target Ip} After running the nmap, we find port 873/tcp open rsync, which...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/synced-linux</link><guid isPermaLink="false">68e5ed42335b984f1adbe14f</guid><pubDate>Wed, 08 Oct 2025 04:49:08 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_4194d5e31c384888a61531cb5dad51ab~mv2.png/v1/fit/w_325,h_133,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Mongod - Linux]]></title><description><![CDATA[Ping  and nmap  target Ip, this time using sudo nmap -p- --minrate-1000 -sV {target Ip} , we know -p- means to scan all 65,535 tcp ports...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/mongod-very-easy-linux</link><guid isPermaLink="false">68e5ebfba062988b03742488</guid><pubDate>Wed, 08 Oct 2025 04:44:10 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_f7111453602f419da36c21f15c5835b4~mv2.png/v1/fit/w_296,h_134,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Preignition - Linux]]></title><description><![CDATA[Ping  and nmap  the target Ip using sudo nmap -sV {target Ip} We find port 80/tcp open http nginx 1.14.2, suggesting the target may be...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/preignition-very-easy-linux</link><guid isPermaLink="false">68e5eb1a5410b45ad9aae292</guid><pubDate>Wed, 08 Oct 2025 04:41:48 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_caef1defe8114b8085253ea227dbbd24~mv2.png/v1/fit/w_318,h_137,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Explosion - Windows]]></title><description><![CDATA[Ping  and nmap  target Ip using sudo nmap -sV {target Ip} We find a couple open ports, with port 3389/tcp open being the most...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/explosion-very-easy-windows</link><guid isPermaLink="false">68e5e9943af439b9bda76fab</guid><pubDate>Wed, 08 Oct 2025 04:36:31 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_cb81a46414a84f8cba9026bddbcc4779~mv2.png/v1/fit/w_338,h_132,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Redeemer - Linux]]></title><description><![CDATA[Ping  and nmap  target Ip, this time we’ll use nmap -p- -sV {target Ip}  to scan all 65,535 tcp ports instead of just the most popular...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/redeemer-very-easy-linux</link><guid isPermaLink="false">68e5e902a062988b03741ebe</guid><pubDate>Wed, 08 Oct 2025 04:31:46 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_1464767548c74b01873409cee6f999ef~mv2.png/v1/fit/w_300,h_128,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Dancing - Windows]]></title><description><![CDATA[Ping {target Ip} , sudo nmap -sV {target Ip} We find port 445/tcp open, port 445 is typically SMB (server message block) which is a...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/dancing-very-easy-windows</link><guid isPermaLink="false">68e5e59b335b984f1adbd2e1</guid><pubDate>Wed, 08 Oct 2025 04:17:16 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_c684e13811384bc7b5799f57a2278f59~mv2.png/v1/fit/w_297,h_130,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item><item><title><![CDATA[Fawn - Linux]]></title><description><![CDATA[Ping {target Ip}  Verify connection, wait for 4 successful replies, Ctrl + C  to cancel Sudo nmap -sV {target Ip}  Port 21/tcp open ftp...]]></description><link>https://justinblawitz.wixsite.com/hackthebox-cybersecu/post/fawn-very-easy-linux</link><guid isPermaLink="false">68e5e4a4335b984f1adbd139</guid><pubDate>Wed, 08 Oct 2025 04:13:39 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/97e817_218336bedb2c4bba8a93139da7a4afc7~mv2.png/v1/fit/w_279,h_132,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>justinblawitz</dc:creator></item></channel></rss>