CURRENT TARGET

ACTIVE SECURE CONNECTION

DOMAIN NAME

Loading...

SYSTEM STATUS

CPU USAGE 78%
MEMORY 64%
NETWORK 1.2 Gbps

ACTIVE PROCESSES

NMAP Scan
PID: 4872
SQL Injection
PID: 5421
Brute Force
PID: 3897
Payload Delivery
PID: 6723

QUICK ACTIONS

Exploit

TERMINAL OUTPUT

root@cybersec:~# nmap -sS -A -T4 target.com

Starting Nmap 7.92 ( https://nmap.org ) at 2023-07-15 14:30 UTC

Nmap scan report for target.com (192.168.1.1)

Host is up (0.045s latency).

PORT STATE SERVICE VERSION

22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)

80/tcp open http Apache httpd 2.4.41 ((Ubuntu))

443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))

3306/tcp open mysql MySQL 5.7.35-0ubuntu0.20.04.1

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 12.45 seconds

root@cybersec:~#

RECENT ACTIVITY

SQL injection attempt successful

2 minutes ago

Admin credentials captured

15 minutes ago

Firewall bypass in progress

32 minutes ago

Intrusion detection triggered

1 hour ago