Port Scanning and Information Gathering With Nmap and Nikto | TryHackMe Probe

Motasem Hamdan
2 min readNov 21, 2023

--

TryHackMe Probe

We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as Nmap and Nikto. We gathered details such as the ports the webserver is running on, the version of the webserver, domain and email information, hidden directories, the PHP version and the content management system running on the machine. We also discovered ssh and FTP server along with other services running on non-standard ports. This was part of TryHackMe Probe.

We used the below commands to run the Nmap scans:

nmap -p- -T4 IP

nmap -p80,1443,9007,443 -A IP

We also used the below commands to scan for hidden directories with gobuster

sudo dir gobuster -u http://IP:8000 -w /usr/share/wordlists/dirbuster/common.txt

We used Nikto and wpscan to reveal more detail about the webserver and the CMS

wpscan — url http://IP:9007 — enumerate ap,at,cb,dbe — disable-tls-checks

wpscan — url http://IP:9007 — enumerate u — disable-tls-checks

Full Writeup is here.

Video Walkthrough

--

--

Motasem Hamdan
Motasem Hamdan

Written by Motasem Hamdan

Motasem Hamdan is a content creator and swimmer who creates cyber security training videos and articles. https://www.youtube.com/@MotasemHamdan

No responses yet