sneakymailer

Recon & Enum

port scan

PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
25/tcp   open  smtp
80/tcp   open  http
143/tcp  open  imap
993/tcp  open  imaps
8080/tcp open  http-proxy

nmap gives domain name = http://sneakycorp.htb

directory scan

subdomain scan

http://dev.sneakycorp.htb

website

page consist of names and emails , nothing more . I can download all email address of the users

register page , but no redirection or action performed

shell as www-data

phishing users

i will try to send phishing mail containing my ip address in the message body , and i open python server on my machine If any user clicks on my ip address i will get a call back

i did get a call back on python server , now i will open nc to check what i get

i got creds for paul

Last updated