Firewall and IDS/IPS Evasion - Easy Lab
May 11, 2024
Last updated
May 11, 2024
Last updated
kyou@parrot:~/academy-htb/enum-nmap/easy-lab$ nmap 10.129.149.0/24
Starting Nmap 7.94 ( https://nmap.org ) at 2024-05-12 00:34 PST
kyou@parrot:~/academy-htb/enum-nmap/easy-lab$ nmap 10.129.149.0/24 -oN subnet
Starting Nmap 7.94 ( https://nmap.org ) at 2024-05-12 00:34 PST
Stats: 0:03:02 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 36.26% done; ETC: 00:42 (0:04:03 remaining)
Stats: 0:07:54 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 67.79% done; ETC: 00:46 (0:03:25 remaining)
Stats: 0:07:55 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 67.80% done; ETC: 00:46 (0:03:25 remaining)
Stats: 0:14:51 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 81.34% done; ETC: 00:53 (0:03:14 remaining)
Stats: 0:19:57 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 91.24% done; ETC: 00:56 (0:01:51 remaining)
Stats: 0:22:22 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 97.22% done; ETC: 00:57 (0:00:37 remaining)
Stats: 0:22:57 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.60% done; ETC: 00:57 (0:00:05 remaining)
Stats: 0:22:57 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.70% done; ETC: 00:57 (0:00:04 remaining)
Stats: 0:23:20 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.99% done; ETC: 00:58 (0:00:00 remaining)
Stats: 0:23:46 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.99% done; ETC: 00:58 (0:00:00 remaining)
Stats: 0:24:22 elapsed; 255 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.99% done; ETC: 00:59 (0:00:00 remaining)
Nmap scan report for 10.129.149.181
Host is up (0.39s latency).
Not shown: 869 closed tcp ports (conn-refused), 128 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
10001/tcp open scp-config
Nmap done: 256 IP addresses (1 host up) scanned in 1468.43 seconds
# Nmap 7.94 scan initiated Sat May 11 23:18:02 2024 as: nmap -sS -O -oN nmap -vv 10.129.149.181
Increasing send delay for 10.129.149.181 from 0 to 5 due to 38 out of 125 dropped probes since last increase.
Increasing send delay for 10.129.149.181 from 5 to 10 due to 11 out of 13 dropped probes since last increase.
Increasing send delay for 10.129.149.181 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
Increasing send delay for 10.129.149.181 from 20 to 40 due to 11 out of 23 dropped probes since last increase.
Nmap scan report for 10.129.149.181
Host is up, received reset ttl 63 (0.29s latency).
Scanned at 2024-05-11 23:18:04 PST for 1315s
Not shown: 869 closed tcp ports (reset), 128 filtered tcp ports (no-response)
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack ttl 63
80/tcp open http syn-ack ttl 63
10001/tcp open scp-config syn-ack ttl 63
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.94%E=4%D=5/11%OT=22%CT=1%CU=31025%PV=Y%DS=2%DC=I%G=Y%TM=663F914
OS:F%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)OPS
OS:(O1=M53CST11NW7%O2=M53CST11NW7%O3=M53CNNT11NW7%O4=M53CST11NW7%O5=M53CST1
OS:1NW7%O6=M53CST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN
OS:(R=Y%DF=Y%T=40%W=FAF0%O=M53CNNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=A
OS:S%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R
OS:=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F
OS:=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%
OS:T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD
OS:=S)
Uptime guess: 14.866 days (since Sat Apr 27 02:53:15 2024)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat May 11 23:39:59 2024 -- 1 IP address (1 host up) scanned in 1317.06 seconds