old htb folders
This commit is contained in:
2023-08-29 21:53:22 +02:00
parent 62ab804867
commit 82b0759f1e
21891 changed files with 6277643 additions and 0 deletions

View File

@@ -0,0 +1,27 @@
# Nmap 7.93 scan initiated Tue Feb 28 12:30:25 2023 as: nmap -vv --reason -Pn -T4 -sU -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/htb/escape/results/escape.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/udp53/xml/udp_53_dns_nmap.xml escape.htb
Nmap scan report for escape.htb (10.129.184.130)
Host is up, received user-set (0.17s latency).
Scanned at 2023-02-28 12:30:26 CET for 38s
PORT STATE SERVICE REASON VERSION
53/udp open domain udp-response ttl 127 (generic dns response: SERVFAIL)
|_dns-cache-snoop: 0 of 100 tested domains are cached.
| fingerprint-strings:
| NBTStat:
|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
| dns-nsec3-enum:
|_ DNSSEC NSEC3 not supported
| dns-nsec-enum:
|_ No NSEC records found
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-UDP:V=7.93%I=7%D=2/28%Time=63FDE5E6%P=x86_64-pc-linux-gnu%r(NBTS
SF:tat,32,"\x80\xf0\x80\x82\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAAAAAAAAAAAAAA
SF:AAAAAAA\0\0!\0\x01");
Host script results:
| dns-brute:
|_ DNS Brute-force hostnames: No results.
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Feb 28 12:31:04 2023 -- 1 IP address (1 host up) scanned in 39.15 seconds

View File

@@ -0,0 +1,19 @@
;; communications error to 10.129.184.130#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> -p 53 -x escape.htb @escape.htb
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 7147
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;htb.escape.in-addr.arpa. IN PTR
;; Query time: 4472 msec
;; SERVER: 10.129.184.130#53(escape.htb) (UDP)
;; WHEN: Tue Feb 28 12:30:34 CET 2023
;; MSG SIZE rcvd: 52

View File

@@ -0,0 +1,6 @@
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @escape.htb escape.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

View File

@@ -0,0 +1,6 @@
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @escape.htb escape.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

View File

@@ -0,0 +1,10 @@
;; communications error to 10.129.184.130#53: timed out
;; communications error to 10.129.184.130#53: timed out
;; communications error to 10.129.184.130#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @escape.htb
; (1 server found)
;; global options: +cmd
;; no servers could be reached

View File

@@ -0,0 +1,7 @@
[*] std: Performing General Enumeration against: escape.htb...
[-] All nameservers failed to answer the DNSSEC query for escape.htb
[-] Exception "The DNS operation timed out." while resolving SOA record.
[-] Error while resolving SOA while using 10.129.184.130 as nameserver.
[*] Enumerating SRV Records
[+] 0 Records Found

View File

@@ -0,0 +1,46 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.93 scan initiated Tue Feb 28 12:30:25 2023 as: nmap -vv -&#45;reason -Pn -T4 -sU -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/htb/escape/results/escape.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/udp53/xml/udp_53_dns_nmap.xml escape.htb -->
<nmaprun scanner="nmap" args="nmap -vv -&#45;reason -Pn -T4 -sU -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/htb/escape/results/escape.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/escape.htb/scans/udp53/xml/udp_53_dns_nmap.xml escape.htb" start="1677583825" startstr="Tue Feb 28 12:30:25 2023" version="7.93" xmloutputversion="1.05">
<scaninfo type="udp" protocol="udp" numservices="1" services="53"/>
<verbose level="2"/>
<debugging level="0"/>
<taskbegin task="NSE" time="1677583826"/>
<taskend task="NSE" time="1677583826"/>
<taskbegin task="NSE" time="1677583826"/>
<taskend task="NSE" time="1677583826"/>
<taskbegin task="NSE" time="1677583826"/>
<taskend task="NSE" time="1677583826"/>
<taskbegin task="UDP Scan" time="1677583826"/>
<taskend task="UDP Scan" time="1677583826" extrainfo="1 total ports"/>
<taskbegin task="Service scan" time="1677583826"/>
<taskend task="Service scan" time="1677583846" extrainfo="1 service on 1 host"/>
<taskbegin task="NSE" time="1677583846"/>
<taskend task="NSE" time="1677583864"/>
<taskbegin task="NSE" time="1677583864"/>
<taskend task="NSE" time="1677583864"/>
<taskbegin task="NSE" time="1677583864"/>
<taskend task="NSE" time="1677583864"/>
<host starttime="1677583826" endtime="1677583864"><status state="up" reason="user-set" reason_ttl="0"/>
<address addr="10.129.184.130" addrtype="ipv4"/>
<hostnames>
<hostname name="escape.htb" type="user"/>
<hostname name="escape.htb" type="PTR"/>
</hostnames>
<ports><port protocol="udp" portid="53"><state state="open" reason="udp-response" reason_ttl="127"/><service name="domain" extrainfo="generic dns response: SERVFAIL" servicefp="SF-Port53-UDP:V=7.93%I=7%D=2/28%Time=63FDE5E6%P=x86_64-pc-linux-gnu%r(NBTStat,32,&quot;\x80\xf0\x80\x82\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\0\0!\0\x01&quot;);" method="probed" conf="10"/><script id="dns-cache-snoop" output="0 of 100 tested domains are cached.&#xa;"/><script id="fingerprint-strings" output="&#xa; NBTStat: &#xa; CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"><elem key="NBTStat">&#xa; CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</elem>
</script><script id="dns-nsec3-enum" output="&#xa; DNSSEC NSEC3 not supported&#xa;"/><script id="dns-nsec-enum" output="&#xa; No NSEC records found&#xa;"/></port>
</ports>
<hostscript><script id="dns-brute" output="&#xa; DNS Brute-force hostnames: No results."><table key="DNS Brute-force hostnames">
</table>
</script></hostscript><times srtt="165743" rttvar="165743" to="828715"/>
</host>
<taskbegin task="NSE" time="1677583864"/>
<taskend task="NSE" time="1677583864"/>
<taskbegin task="NSE" time="1677583864"/>
<taskend task="NSE" time="1677583864"/>
<taskbegin task="NSE" time="1677583864"/>
<taskend task="NSE" time="1677583864"/>
<runstats><finished time="1677583864" timestr="Tue Feb 28 12:31:04 2023" summary="Nmap done at Tue Feb 28 12:31:04 2023; 1 IP address (1 host up) scanned in 39.15 seconds" elapsed="39.15" exit="success"/><hosts up="1" down="0" total="1"/>
</runstats>
</nmaprun>