Firewall and IDS/IPS Evasion - Hard Lab

May 12, 2024

# Nmap 7.94 scan initiated Sun May 12 17:53:14 2024 as: nmap -sV -sS -Pn -n --disable-arp-ping -oN answer.nmap -p 50000 -vv --source-port 53 10.129.158.233
Nmap scan report for 10.129.158.233
Host is up, received user-set (1.5s latency).
Scanned at 2024-05-12 17:53:14 PST for 44s

PORT      STATE SERVICE    REASON         VERSION
50000/tcp open  tcpwrapped syn-ack ttl 63

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun May 12 17:53:58 2024 -- 1 IP address (1 host up) scanned in 43.69 seconds
sudo nc -p 53 10.129.158.233 50000

Last updated