<spl4t.blog>

A personal development diary.

  • Port scanning, service version & OS detection, tweaking the service enumeration intensity level… Just which version of Linux is running on the target anyway? SYN scan > TCP Full scan Taking a look at the Nmap scripting engine next time.

  • Liking the options so far, nice and simple, just learning the ropes.

  • Transport Layer today, nice bit of TCP & UDP. Now that’s complete it’s on to the host discovery techniques, starting with more Nmap.

  • Checking back in with some networking fundamentals, then a bit of a deeper look at the Network layer.

  • So here is the first lab. I completed it yesterday (21/02/2026) but wanted to repeat it and take notes on it this time. Flag 1: This tells search engines what to avoid and what not to crawl. From the training video regarding website recon & footprinting, we should know to look at the contents of…

  • A bit disappointed, to be honest… The content taught thus far brought me to the first two flags easily enough when I referred to my notes. Flags 3 & 4 required me to refer to write-ups others have done, as the initial module did not discuss dirb, nor curl. Leveraging grep got me the last…

  • Nmap

    Basic host discovery and port scanning huh, let’s do it -p-

  • Lets delve a bit deeper into the stuff we can do without permission and take a look at theHarvester.

  • I need to be given an equivalent of Duolingo gems for returning 2 days running. Lets keep the streak going, hey?

  • So let us begin again. An end goal is in mind. I have a target, time to stay on it.