Categories
Tags
185 words
1 minutes
Cypher
User Flag
Nmap Scan
As always we start with an Nmap scan
# Nmap 7.94SVN scan initiated Sat Mar 1 22:40:25 2025 as: nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.57
Nmap scan report for 10.10.11.57 (10.10.11.57)
Host is up (0.050s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 be:68:db:82:8e:63:32:45:54:46:b7:08:7b:3b:52:b0 (ECDSA)
|_ 256 e5:5b:34:f5:54:43:93:f8:7e:b6:69:4c:ac:d6:3d:23 (ED25519)
80/tcp open http nginx 1.24.0 (Ubuntu)
|_http-title: Did not follow redirect to http://cypher.htb/
|_http-server-header: nginx/1.24.0 (Ubuntu)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5.0
OS details: Linux 5.0
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 1025/tcp)
HOP RTT ADDRESS
1 50.10 ms 10.10.14.1 (10.10.14.1)
2 50.16 ms 10.10.11.57 (10.10.11.57)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Mar 1 22:40:50 2025 -- 1 IP address (1 host up) scanned in 24.89 seconds
I added cypher.htb
to /etc/hosts
echo -e "10.10.11.57\tcypher.htb" | sudo tee -a /etc/hosts
10.10.11.57 cypher.htb
TIPFull writeup will be posted as soon as the machine expires.