If UDP is your only option to communicate with the server, then what options does NMAP offer to get as much detail from the data as possible? Is there a way to increase the scans intensity?
I remember this one. Be mindful of using the SYN option; is that for UDP? Look in the man page for nmap. There should be something related to intensity.
There’s a couple option configurations I found that get you what you’re looking for. Remember to be patient. Take a moment to clear your head, then come back to it.
If you’re using packet trace, you can run the scan and direct the output to a file. Cat and grep the file through pipes to see what responses you’re getting from that target IP. Could be the IPS/Firewall is dropping packets received from you due to the number of decoys(look up SYN flooding). If you notice you’re not getting any responses, you might need to reset the target.
Again, you’re very close to the scan I used to get what you’re looking for. I’ll give you another hint: Look for a ‘script’ that can ‘trace’ all data sent and received.
EDIT: So I went back to try this and I’m not getting the answer using the same scan I used before. Very possible something was changed. I’ll keep messing with it and let you know.
2nd EDIT: Make sure you are using the VPN key provided by the questions near the bottom of the page.
Yes I did manage to get the results like before. I decided to delete the VPN key I had, then re-download it. After connecting, I got the answer with the first try. Kinda strange.
It took me a while to get the answer when I first took the module, so don’t feel bad.
If you’re still struggling, I’d drop the sS scan, and make it -sUV. I’m not entirely sure if the bind script is necessary either. I could be wrong about that, though.
I spent 2 days trying to solve this challenge. It turns out it couldn’t be solved using the VPN connected to my own Kali box. As soon as I used the built in parrot OS workstation, I got the flag. I recommend using the Parrot OS workstation provided by HTB if you are stuck.
got stuck too.
also solved it with machine reset and new vpn connection file on own machine and the nse part.
before getting new vpn file, i only saw the name of the dns server, but no “version” or flag.
think before reset that i had the problem on the parrot box too.
To solve it i didnt needed any decoys or --source-port, also no masking of source address was needed. It was just UDP related. Dont know if its intended like this.