-
Notifications
You must be signed in to change notification settings - Fork 1
/
NetworkEnumerationWithNmap
27 lines (20 loc) · 1.46 KB
/
NetworkEnumerationWithNmap
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Find all TCP ports on your target. Submit the total number of found TCP ports as the answer.
7
Enumerate the hostname of your target and submit it as the answer. (case-sensitive)
nix-nmap-default
Perform a full TCP port scan on your target and create an HTML report. Submit the number of the highest port as the answer.
31337
Enumerate all ports and their services. One of the services contains the flag you have to submit as the answer.
HTB{pr0F7pDv3r510nb4nn3r}
Use NSE and its scripts to find the flag that one of the services contain and submit it as the answer.
/robots.txt
HTB{873nniuc71bu6usbs1i96as6dsv26}
Our client wants to know if we can identify which operating system their provided machine is running on. Submit the OS name as the answer.
Ubuntu
After the configurations are transferred to the system, our client wants to know if it is possible to find out our target's DNS server version. Submit the DNS server version of the target as the answer.
sudo nmap -sUV -p 53 --script dns-nsid 10.129.112.39 -Pn -n --disable-arp-ping --packet-trace -D RND:5 --max-retries 50 --version-intensity 9 -sV
HTB{GoTtgUnyze9Psw4vGjcuMpHRp}
Now our client wants to know if it is possible to find out the version of the running services. Submit the version of the service our client was talking about as the answer.
sudo nmap -sV -p- --source-port 53 10.129.2.47
sudo nc -vn 10.129.2.47 50000 -p 53
HTB{kjnsdf2n982n1827eh76238s98di1w6}