RustScan


┌──(kali㉿kali)-[~/archive/htb/labs/sea]
└─$ rustscan -a $IP
RustScan: Exploring the digital landscape, one IP at a time.
 
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open 10.10.11.28:22
Open 10.10.11.28:80

Nmap


┌──(kali㉿kali)-[~/archive/htb/labs/sea]
└─$ nmap -sC -sV -p22,80 $IP              
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-11 13:05 CEST
Nmap scan report for 10.10.11.28
Host is up (0.019s latency).
 
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 e3:54:e0:72:20:3c:01:42:93:d1:66:9d:90:0c:ab:e8 (RSA)
|   256 f3:24:4b:08:aa:51:9d:56:15:3d:67:56:74:7c:20:38 (ECDSA)
|_  256 30:b1:05:c6:41:50:ff:22:a3:7f:41:06:0e:67:fd:50 (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Sea - Home
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
|_http-server-header: Apache/2.4.41 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.27 seconds

The target system appears to be Ubuntu

UDP


┌──(kali㉿kali)-[~/archive/htb/labs/sea]
└─$ sudo nmap -Pn -sU -top-ports 1000 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-11 13:46 CEST
Stats: 0:08:22 elapsed; 0 hosts completed (1 up), 1 undergoing UDP Scan
UDP Scan Timing: About 49.59% done; ETC: 14:03 (0:08:31 remaining)
Nmap scan report for 10.10.11.28
Host is up (0.052s latency).
Not shown: 999 closed udp ports (port-unreach)
PORT   STATE         SERVICE
68/udp open|filtered dhcpc
 
Nmap done: 1 IP address (1 host up) scanned in 1058.91 seconds