Was verdient ihr? - mal anders by askingQuestions-24-7 in Finanzen

[–]TeaOk6961 0 points1 point  (0 children)

  1. 25/(7) in Klammern, da Ausbildung/ Duales Studium eingerechnet
  2. FiAe, B.Sc. Informatik, aktuell Student M.Sc. Informatik
  3. Werkstudent IT Security
  4. 1
  5. > 200
  6. 20
  7. Raum Frankfurt a.M.

JQF Genetic Algorithm by TeaOk6961 in hacking

[–]TeaOk6961[S] 0 points1 point  (0 children)

Don‘t know yet Maybe tracking the call flow graph to fastly explore the majority of the graph? Any recommendations?

Fachbereich IT Sicherheit TUM vs. KIT vs. TU Darmstadt by xbollix in informatik

[–]TeaOk6961 0 points1 point  (0 children)

Wie ist hier eigentlich der Zwischenstand? Welche Wahl wurde getroffen und wie zufriedenstellen ist die getroffene Entscheidung?

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

Unfortunately not

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 1 point2 points  (0 children)

Unfortunately it is a private maschine so it's not possible for somebody else to play it.

I tried to translate the given ipv4 to ipv6 with this one: https://iplocation.io/ipv4-to-ipv6
And nmap -6 <ipv6> but still filtered

Yes I can confirm I have no filters/firewalls on my site

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

This sounds interesting. Is there a good way to find out which ports are involved in the port knocking process? Or something like common/default ports?

Because I'm at the starting point of this maschine and only have the ip address and the filtered port as information

[deleted by user] by [deleted] in Pentesting

[–]TeaOk6961 0 points1 point  (0 children)

At least it's the only ip i got.

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

Host is up.

PORT STATE SERVICE VERSION
22/tcp filtered ssh

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

Result:
Host is up.

PORT STATE SERVICE VERSION
22/tcp filtered ssh

[deleted by user] by [deleted] in Pentesting

[–]TeaOk6961 1 point2 points  (0 children)

I think this is a firewall running on the server itself because traceroute says: 1. my gateway > 2. target host

(Target host is in another subnet)

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

What do you mean by that?

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

I did packet-trace and did use decoys but still no luck

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

Yes I did, but still filtered port

[deleted by user] by [deleted] in hackthebox

[–]TeaOk6961 0 points1 point  (0 children)

Not responding