Attacking Common Services - Medium

module is broken lol… the -sC doesn’t even run scripts against it and return anything

I got it to work. No idea why the order of the -flags helped, but try in this order of -flags and it should reveal the user and also details about the FTP service running on the custom port.

sudo nmap -Pn -sV -p- -sC xxxxxxxxxx

:heart:

This was a lot easier than the easy lab but I had to restart this one about 7 times before i found the right port

1 Like

Easy steps to complete this section
1.nmap target -T 4
2.nc target port // for banner grabbing
3.find things and use every where…

I think this lab was easier than the Easy one. However, it teaches you to think on “what you can’t see”.
Nmap tracks a proxy-ftp server, hinting that, somewhere there should be a ftp server. Unfortunately I focused too much on what was there and too little on what was not, but I found that as a good exercise.

I agreed, I feel pretty dumb now after struggling for few days

Nice

Hello guys,
I was stuck at this as well, but this reply helped the most. Find unexpected port for service with -p- flag on nmap and then everything else should be easy.
If nmap is taking forever, reset the machine.
Alternatively, search for YT video it might nudge you in the right direction.