A Hack the Box Walkthrough  – Resolute (ISE Blog)


First, we’ll start with a TCP scan, and if no interesting services are found, we can switch to a UDP scan to uncover more potential attack surface. I use a standard nmap command that enumerates all ports & services on a target machine