With our second test's help, our client was able to gain new insights and sent one of its administrators to a training course for IDS/IPS systems. As our client told us, the training would last one week. Now the administrator has taken all the necessary precautions and wants us to test this again because specific services must be changed, and the communication for the provided software had to be modified.
Questions
Answer the question(s) below to complete this Section and earn cubes!
Target: 10.129.2.47
Now our client wants to know if it is possible to find out the version of the running services. Identify the version of service our client was talking about and submit the flag as the answer.
Answer: HTB{kjnsdf2n982n1827eh76238s98di1w6}
Ok so unlike the first one we do not know what service is running whether it be TCP or UDP protocols or even a port range on the target. So let us start by running a full port scan while still trying to stay stealthy and avoid detections.
(FYI go do something else while this runs, its going to take some time)
$ sudo nmap -p- -sS -T 2 10.129.2.47 | tee Documents/htb/labs/nmap/results/hard-lab-init
[sudo] password for cscogin:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-11-24 13:44 CST
...
...
...Some time later
That took a little too long so lets run a faster more aggressive scan to cut down on some time and see if it works.
Cool we see a new service not yet seen for IBM DB2 database that seems to be responding to DNS requests. Lets fire up the good ole nc (netcat command) to make a connection.
And viola the service returns data!
Finally we can submit and officially wrap up the htb academy nmap training module.