Service Enumeration
Network Enumeration
Enumeration
Host Discovery
Command:
sudo nmap -O 10.129.228.63
Result: OS fingerprinting indicates the target operating system.
Port Scanning
Command:
sudo nmap -p- 10.129.228.63
Result: Open ports include 22, 80, 110, 139, 143, 445, and 31337.
Service Enumeration
Command:
sudo nmap -sV -p31337 10.129.228.63
Result: Banner reveals the flag.
NSE Scripts
Command:
sudo nmap -p80 --script vuln 10.129.228.63
Result:
/robots.txt
detected with the flag.
Export Results to HTML
Command:
xsltproc nmap.xml -o nmap.html
Result: Report generated as
nmap.html
.
Privilege Update
Bypass IDS/IPS
Command:
sudo nmap -sV -Pn -p80 10.129.22.245
Result: Detected Apache HTTPD version.
Last updated