I am new to here PLEASE HELP
As many time i am scanning a maching getting the same response
root@abhi:~# nmap -p- -A -T4 10.10.10.198
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-03 13:58 IST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 2.50 seconds
Its mentioned as target IP @ starting point section enumeration, at the end you can submit a flag. If i’m correct you have to be VIP to obtain the flag?
Its mentioned at target IP @ starting point section enumeration, ad the end you can submit a flag. If i’m correct you have to be VIP to obtain the flag?
Ok - this might be the source of the problem. From what I can see - and just testing - the Pwnbox uses your normal VPN.
I’ve just started a Pwnbox instance and then started CALAMITY and nmap worked fine, but it hit CALAMITY not ARCHETYPE.
Hi, I’m having a similar issue. I’m trying to access Lame (10.10.10.3), I’m VIP, the box is active, I can successfully ping the machine but nmap says the host is down. Same with other boxes. Any suggestions?
Hi, I’m having a similar issue. I’m trying to access Lame (10.10.10.3), I’m VIP, the box is active, I can successfully ping the machine but nmap says the host is down. Same with other boxes. Any suggestions?
Hi, I’m having a similar issue. I’m trying to access Lame (10.10.10.3), I’m VIP, the box is active, I can successfully ping the machine but nmap says the host is down. Same with other boxes. Any suggestions?
nmap -Pn
Thanks. I’ve tried that earlier and it does work but I don’t think I should have to be doing that?
A separate issue is that the version of the vulnerable software on the box is different to that in any walkthroughs. The Metasploit exploit listed in the walkthrough fails to work, seemingly because of this.
(Quote)
Thanks. I’ve tried that earlier and it does work but I don’t think I should have to be doing that?
A separate issue is that the version of the vulnerable software on the box is different to that in any walkthroughs. The Metasploit exploit listed in the walkthrough fails to work, seemingly because of this.
There are no issues with the Pn flag.
As for the vuln service being different that is an issue. Maybe try to contact support.
I agree - and I nearly always use it because there is normally no point doing a ping on HTB. However, I dont think it will solve the problem here. If the box responds to ping but not the scans then skipping the ping probably wont make it respond.
(And, yes, there are situations where it might but I’ve never seen one on HTB )