# Intermediate Nmap
link: https://tryhackme.com/room/intermediatenmap
---
Hello, simple nmap writeup.
1) We need to scan following IP
``` bash
nmap -p- -sS -T5 -n -Pn <IP>
```

So we found 3 open ports, let's check the highter port go netcat connection
``` bash
nc <IP> <port>
```

Looks great, we found credentials, so try them to first SSH port
``` bash
ssh <username>@<IP>
```

After connection we need to search for something

Whoa, flag was found!!! 🙃
Thanks for reading.
---
**Follow me**
telegram: https://t.me/SahtaGo
twitter: https://twitter.com/SahtaGo
---