Skip to content

Firewall and IDS/IPS Evasion Easy Lab

ℹ️ Informations


Question

No questions

📋 Walkthrough

Let's do a fast nmap

nmap --min-rate=10000 10.129.40.149
Here's output
PORT      STATE SERVICE
22/tcp    open  ssh
80/tcp    open  http
10001/tcp open  scp-config
We also can try to grab banner on port 80.
nc 10.129.40.149 80                    

HTTP/1.1 400 Bad Request
Date: Sat, 24 Aug 2024 14:32:21 GMT
Server: Apache/2.4.29 (Ubuntu)
Content-Length: 301
Connection: close
Content-Type: text/html; charset=iso-8859-1
...
We can see the OS.

Answer

Ubuntu