CDSA

A Hack the Box Walkthrough  – Resolute (ISE Blog)

[svg-table-content]

First, we’ll start with a TCP scan, and if no interesting services are found, we can switch to a UDP scan to uncover more potential attack surface. I use a standard nmap command that enumerates all ports & services on a target machine