# Nmap 7.93 scan initiated Fri Jan 27 10:41:32 2023 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN /home/kali/htb/soccer/results/scans/_full_tcp_nmap.txt -oX /home/kali/htb/soccer/results/scans/xml/_full_tcp_nmap.xml 10.10.11.194 Nmap scan report for soccer.htb (10.10.11.194) Host is up, received user-set (0.056s latency). Scanned at 2023-01-27 10:41:32 CET for 50s Not shown: 65532 closed tcp ports (conn-refused) PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 ad0d84a3fdcc98a478fef94915dae16d (RSA) | ssh-rsa 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 | 256 dfd6a39f68269dfc7c6a0c29e961f00c (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIy3gWUPD+EqFcmc0ngWeRLfCr68+uiuM59j9zrtLNRcLJSTJmlHUdcq25/esgeZkyQ0mr2RZ5gozpBd5yzpdzk= | 256 5797565def793c2fcbdb35fff17c615c (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ2Pj1mZ0q8u/E8K49Gezm3jguM3d8VyAYsX0QyaN6H/ 80/tcp open http syn-ack nginx 1.18.0 (Ubuntu) |_http-title: Soccer - Index | http-methods: |_ Supported Methods: GET HEAD |_http-server-header: nginx/1.18.0 (Ubuntu) 9091/tcp open xmltec-xmlmail? syn-ack | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Hello, Help, RPCCheck, drda, informix: | HTTP/1.1 400 Bad Request | Connection: close | GetRequest: | HTTP/1.1 404 Not Found | Content-Security-Policy: default-src 'none' | X-Content-Type-Options: nosniff | Content-Type: text/html; charset=utf-8 | Content-Length: 139 | Date: Fri, 27 Jan 2023 09:41:51 GMT | Connection: close | | |
| |Cannot GET /| | | HTTPOptions, RTSPRequest: | HTTP/1.1 404 Not Found | Content-Security-Policy: default-src 'none' | X-Content-Type-Options: nosniff | Content-Type: text/html; charset=utf-8 | Content-Length: 143 | Date: Fri, 27 Jan 2023 09:41:52 GMT | Connection: close | | | | |
Cannot OPTIONS /| |_ 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port9091-TCP:V=7.93%I=9%D=1/27%Time=63D39C5A%P=x86_64-pc-linux-gnu%r(in SF:formix,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r SF:\n\r\n")%r(drda,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x SF:20close\r\n\r\n")%r(GetRequest,168,"HTTP/1\.1\x20404\x20Not\x20Found\r\ SF:nContent-Security-Policy:\x20default-src\x20'none'\r\nX-Content-Type-Op SF:tions:\x20nosniff\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nCo SF:ntent-Length:\x20139\r\nDate:\x20Fri,\x2027\x20Jan\x202023\x2009:41:51\ SF:x20GMT\r\nConnection:\x20close\r\n\r\n\n\n\n\n
Cannot\x20GET\x20/\n\n\n")%r(HT SF:TPOptions,16C,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Security-Pol SF:icy:\x20default-src\x20'none'\r\nX-Content-Type-Options:\x20nosniff\r\n SF:Content-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20143\ SF:r\nDate:\x20Fri,\x2027\x20Jan\x202023\x2009:41:52\x20GMT\r\nConnection: SF:\x20close\r\n\r\n\n\n\n
C SF:annot\x20OPTIONS\x20/\n\n\n")%r(RTSPRequest,16C,"HT SF:TP/1\.1\x20404\x20Not\x20Found\r\nContent-Security-Policy:\x20default-s SF:rc\x20'none'\r\nX-Content-Type-Options:\x20nosniff\r\nContent-Type:\x20 SF:text/html;\x20charset=utf-8\r\nContent-Length:\x20143\r\nDate:\x20Fri,\ SF:x2027\x20Jan\x202023\x2009:41:52\x20GMT\r\nConnection:\x20close\r\n\r\n SF:\n\n\n\n
Cannot\x20OPTIONS\ SF:x20/\n\n\n")%r(RPCCheck,2F,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,2F SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")% SF:r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect SF:ion:\x20close\r\n\r\n")%r(Hello,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nConnection:\x20close\r\n\r\n"); Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Fri Jan 27 10:42:22 2023 -- 1 IP address (1 host up) scanned in 50.63 seconds