# Intermediate Nmap link: https://tryhackme.com/room/intermediatenmap --- Hello, simple nmap writeup. 1) We need to scan following IP ``` bash nmap -p- -sS -T5 -n -Pn <IP> ``` ![](https://i.imgur.com/9FNDctb.png) So we found 3 open ports, let's check the highter port go netcat connection ``` bash nc <IP> <port> ``` ![](https://i.imgur.com/D0vkuxo.png) Looks great, we found credentials, so try them to first SSH port ``` bash ssh <username>@<IP> ``` ![](https://i.imgur.com/kydEZ2H.png) After connection we need to search for something ![](https://i.imgur.com/kGejASY.png) Whoa, flag was found!!! 🙃 Thanks for reading. --- **Follow me** telegram: https://t.me/SahtaGo twitter: https://twitter.com/SahtaGo ---