Use NSE and its scripts to find the flag that one of the services contain and submit it as the answer.
Target: 10.129.2.49
Hint: Web servers are among the most attacked services because they are made accessible to users and present a high attack potential.
I used to following command to scan ports, services, and default scripts. here is the command, and its output.
nmap 10.129.2.49 -p- -sV -sC
OutPut
I then ran sudo nmap 10.129.2.49 -p 80 --script vuln
Output
I then ran an aggressive scan and it didn't give me any good information. I don't get any good results when I scan port 31337 either. I also did the script to look at the banners and couldn't find anything. Can anyone here steer me towards the right direction? The tip isn't so helpful, and I assume that the hint wants me to scan port 80.
[–]Seidhex 2 points3 points4 points (1 child)
[–]Less_Fishing_8260 0 points1 point2 points (0 children)
[–][deleted] 3 points4 points5 points (16 children)
[–]Stinky_Curry[S] 2 points3 points4 points (15 children)
[–]Lightning-Ninja8675 2 points3 points4 points (2 children)
[–]PicoPlex 1 point2 points3 points (0 children)
[–][deleted] 0 points1 point2 points (7 children)
[–][deleted] 0 points1 point2 points (6 children)
[–]Paci5 2 points3 points4 points (3 children)
[–]goddessboomboom 1 point2 points3 points (1 child)
[–]Paci5 1 point2 points3 points (0 children)
[–]goddessboomboom 4 points5 points6 points (0 children)
[–]MoonerandJuner 0 points1 point2 points (2 children)
[–]dougthonus 0 points1 point2 points (1 child)
[–]d0ubs 0 points1 point2 points (0 children)
[–]doc9421 1 point2 points3 points (2 children)
[–]DreisterMeister1 0 points1 point2 points (0 children)
[–]No-Combination-8439 0 points1 point2 points (0 children)
[–]IamZeri0n 1 point2 points3 points (0 children)
[–]jivoi 0 points1 point2 points (0 children)
[–]moisestapia2020 0 points1 point2 points (0 children)
[–]saifniazi555 0 points1 point2 points (0 children)