Valley (Easy) CTF — TryHackMe Writeup
文章描述了一次渗透测试中的NMAP扫描过程及其结果。通过命令`nmap -sVC -p- -T4 -v <ip>`对目标IP进行全端口扫描,并获取了服务版本和默认脚本输出。结果显示开放端口包括22(SSH)、80(HTTP)和37370(FTP),并提供了各服务的详细信息及NSE脚本结果。 2025-9-19 06:2:45 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Error

Press enter or click to view image in full size

FREE READ LINK

Writeup Summary:

  • User Flag
  • Root Flag

User Flag:

Firstly we start with NMAP Scan with command:

nmap -sVC -p- -T4 -v <ip>

What it does:

  • -sV → Detect service versions
  • -sC → Run default scripts
  • -p- → Scan all 65,535 ports
  • -T4 → Use aggressive timing (fast but still reliable)
  • -v → Verbose output
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux;
protocol 2.0)
| ssh-hostkey:
| 3072 c2:84:2a:c1:22:5a:10:f1:66:16:dd:a0:f6:04:62:95 (RSA)
| 256 42:9e:2f:f6:3e:5a:db:51:99:62:71:c4:8c:22:3e:bb (ECDSA)
|_ 256 2e:a0:a5:6c:d9:83:e0:01:6c:b9:8a:60:9b:63:86:72 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html).
| http-methods:
|_ Supported Methods: OPTIONS HEAD GET POST
|_http-server-header: Apache/2.4.41 (Ubuntu)
37370/tcp open ftp vsftpd 3.0.3
Service Info: OSs: Linux, Unix; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning.
Initiating NSE at 19:39
Completed NSE at 19:39, 0.00s elapsed
Initiating NSE at 19:39
Completed NSE at 19:39, 0.00s elapsed…

文章来源: https://infosecwriteups.com/valley-easy-ctf-tryhackme-writeup-42f81a032083?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh