laokoon
This commit is contained in:
@@ -0,0 +1,26 @@
|
||||
# Nmap 7.93 scan initiated Sat Oct 28 14:27:53 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131
|
||||
Nmap scan report for megacorp.htb (10.129.243.131)
|
||||
Host is up, received user-set (0.035s latency).
|
||||
Scanned at 2023-10-28 14:27:57 CEST for 164s
|
||||
|
||||
PORT STATE SERVICE REASON VERSION
|
||||
53/tcp open domain? syn-ack ttl 127
|
||||
| dns-nsec-enum:
|
||||
|_ No NSEC records found
|
||||
| fingerprint-strings:
|
||||
| SSLSessionReq:
|
||||
|_ 1e8NgBanmCRTbV2FJOqv
|
||||
| dns-nsec3-enum:
|
||||
|_ DNSSEC NSEC3 not supported
|
||||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
|
||||
SF-Port53-TCP:V=7.93%I=7%D=10/28%Time=653CFE83%P=x86_64-pc-linux-gnu%r(SSL
|
||||
SF:SessionReq,2C,"\0\*\x86L\x81\x82\0\x01\0\0\0\0\0\0\x141e8NgBanmCRTbV2FJ
|
||||
SF:Oqv\x03com\0\0\x1c\0\x01");
|
||||
|
||||
Host script results:
|
||||
| dns-brute:
|
||||
|_ DNS Brute-force hostnames: No results.
|
||||
|
||||
Read data files from: /usr/bin/../share/nmap
|
||||
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
||||
# Nmap done at Sat Oct 28 14:30:41 2023 -- 1 IP address (1 host up) scanned in 168.63 seconds
|
||||
@@ -0,0 +1,19 @@
|
||||
;; communications error to 10.129.243.131#53: timed out
|
||||
|
||||
; <<>> DiG 9.18.11-2-Debian <<>> -p 53 -x 10.129.243.131 @10.129.243.131
|
||||
;; global options: +cmd
|
||||
;; Got answer:
|
||||
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 27975
|
||||
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
|
||||
|
||||
;; OPT PSEUDOSECTION:
|
||||
; EDNS: version: 0, flags:; udp: 4000
|
||||
;; QUESTION SECTION:
|
||||
;131.243.129.10.in-addr.arpa. IN PTR
|
||||
|
||||
;; Query time: 4536 msec
|
||||
;; SERVER: 10.129.243.131#53(10.129.243.131) (UDP)
|
||||
;; WHEN: Sat Oct 28 14:28:02 CEST 2023
|
||||
;; MSG SIZE rcvd: 56
|
||||
|
||||
|
||||
@@ -0,0 +1,6 @@
|
||||
|
||||
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @10.129.243.131 megacorp.htb
|
||||
; (1 server found)
|
||||
;; global options: +cmd
|
||||
; Transfer failed.
|
||||
|
||||
@@ -0,0 +1,11 @@
|
||||
;; communications error to 10.129.243.131#53: timed out
|
||||
|
||||
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @10.129.243.131
|
||||
; (1 server found)
|
||||
;; global options: +cmd
|
||||
;; Query time: 4756 msec
|
||||
;; SERVER: 10.129.243.131#53(10.129.243.131) (UDP)
|
||||
;; WHEN: Sat Oct 28 14:28:03 CEST 2023
|
||||
;; MSG SIZE rcvd: 28
|
||||
|
||||
|
||||
@@ -0,0 +1,3 @@
|
||||
[*] std: Performing General Enumeration against: megacorp.htb...
|
||||
[-] Could not resolve domain: megacorp.htb
|
||||
|
||||
@@ -0,0 +1,45 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE nmaprun>
|
||||
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
|
||||
<!-- Nmap 7.93 scan initiated Sat Oct 28 14:27:53 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131 -->
|
||||
<nmaprun scanner="nmap" args="nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131" start="1698496073" startstr="Sat Oct 28 14:27:53 2023" version="7.93" xmloutputversion="1.05">
|
||||
<scaninfo type="syn" protocol="tcp" numservices="1" services="53"/>
|
||||
<verbose level="2"/>
|
||||
<debugging level="0"/>
|
||||
<taskbegin task="NSE" time="1698496077"/>
|
||||
<taskend task="NSE" time="1698496077"/>
|
||||
<taskbegin task="NSE" time="1698496077"/>
|
||||
<taskend task="NSE" time="1698496077"/>
|
||||
<taskbegin task="NSE" time="1698496077"/>
|
||||
<taskend task="NSE" time="1698496077"/>
|
||||
<taskbegin task="SYN Stealth Scan" time="1698496077"/>
|
||||
<taskend task="SYN Stealth Scan" time="1698496077" extrainfo="1 total ports"/>
|
||||
<taskbegin task="Service scan" time="1698496077"/>
|
||||
<taskend task="Service scan" time="1698496225" extrainfo="1 service on 1 host"/>
|
||||
<taskbegin task="NSE" time="1698496225"/>
|
||||
<taskend task="NSE" time="1698496240"/>
|
||||
<taskbegin task="NSE" time="1698496240"/>
|
||||
<taskend task="NSE" time="1698496241"/>
|
||||
<taskbegin task="NSE" time="1698496241"/>
|
||||
<taskend task="NSE" time="1698496241"/>
|
||||
<host starttime="1698496077" endtime="1698496241"><status state="up" reason="user-set" reason_ttl="0"/>
|
||||
<address addr="10.129.243.131" addrtype="ipv4"/>
|
||||
<hostnames>
|
||||
<hostname name="megacorp.htb" type="PTR"/>
|
||||
</hostnames>
|
||||
<ports><port protocol="tcp" portid="53"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="domain" servicefp="SF-Port53-TCP:V=7.93%I=7%D=10/28%Time=653CFE83%P=x86_64-pc-linux-gnu%r(SSLSessionReq,2C,"\0\*\x86L\x81\x82\0\x01\0\0\0\0\0\0\x141e8NgBanmCRTbV2FJOqv\x03com\0\0\x1c\0\x01");" method="table" conf="3"/><script id="dns-nsec-enum" output="
 No NSEC records found
"/><script id="fingerprint-strings" output="
 SSLSessionReq: 
 1e8NgBanmCRTbV2FJOqv"><elem key="SSLSessionReq">
 1e8NgBanmCRTbV2FJOqv</elem>
|
||||
</script><script id="dns-nsec3-enum" output="
 DNSSEC NSEC3 not supported
"/></port>
|
||||
</ports>
|
||||
<hostscript><script id="dns-brute" output="
 DNS Brute-force hostnames: No results."><table key="DNS Brute-force hostnames">
|
||||
</table>
|
||||
</script></hostscript><times srtt="35361" rttvar="35361" to="176805"/>
|
||||
</host>
|
||||
<taskbegin task="NSE" time="1698496241"/>
|
||||
<taskend task="NSE" time="1698496241"/>
|
||||
<taskbegin task="NSE" time="1698496241"/>
|
||||
<taskend task="NSE" time="1698496241"/>
|
||||
<taskbegin task="NSE" time="1698496241"/>
|
||||
<taskend task="NSE" time="1698496241"/>
|
||||
<runstats><finished time="1698496241" timestr="Sat Oct 28 14:30:41 2023" summary="Nmap done at Sat Oct 28 14:30:41 2023; 1 IP address (1 host up) scanned in 168.63 seconds" elapsed="168.63" exit="success"/><hosts up="1" down="0" total="1"/>
|
||||
</runstats>
|
||||
</nmaprun>
|
||||
Reference in New Issue
Block a user