nmap - Evasion Lab - Easy - htb
Firewall and IDS/IPS Evasion - Easy Lab
Now let's get practical. A company hired us to test their IT security defenses, including their IDS and IPS systems. Our client wants to increase their IT security and will, therefore, make specific improvements to their IDS/IPS systems after each successful test. We do not know, however, according to which guidelines these changes will be made. Our goal is to find out specific information from the given situations.
We are only ever provided with a machine protected by IDS/IPS systems and can be tested. For learning purposes and to get a feel for how IDS/IPS can behave, we have access to a status web page at:
http://<target IP>/status.php
This page shows us the number of alerts. We know that if we receive a specific amount of alerts, we will be banned. Therefore we have to test the target system as quietly as possible.
Questions
Answer the question(s) below to complete this Section and earn cubes!
Target: 10.129.2.80
Our client wants to know if we can identify which operating system their provided machine is running on. Submit the OS name as the answer.
Answer:
Lets start by pulling up the status.php endpoint so we can monitor alerts.
After visiting it lists a max of 100 alerts and it continously counts up so we have to work carefully.
We can start a simple SYN scan to find open ports
Next we can try and run some discovery scripts on the narrowed ports list
Let's check in on the status page.
[!] You have been detected and banned for 3 minutes!
Uh-oh looks like we need to be a little quiter, maybe we disable some options in our scan to make us quieter.
Added Flags:
--disable-arp-ping-Pn--packet-trace
Let's try one port at a time and increase the performance to 2 - polite and steadily decrease as needed.
Bam! Looks like we were able to use nmap only and not have to use a secondary tool to discover the OS version and name.
OS Name: Ubuntu-4ubuntu2.10
Submmiting is successful after giving the parent OS and not OS with version. This was very CTFish for submitting the answer, but hey we made it through and now on to the next one.
Last updated