Documenting my journey through cybersecurity.
The CIA triad describes three principles involved in protecting data. Confidentiality Integrity Availability Confidentiality Confidentiality...
SMB Scanning the machine we find the following services running: SMB (445) SQL Server (1433) We can list the shares or services by using the...
FTP We begin by scanning the box with nmap. We find two ports open on the machine: 21 (ftp) and 22 (ssh) We can access the ftp server using the...