nmap issue

I am new in this portal and ethical hacking. As per instruction i have installed Kali in VM and started from most easy “Legacy” system but facing challenge when trying to get information through nmap tool. All the time i am getting below message
" Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 0.49 seconds"

Some more points,
My connection is on. I have changed from udp to tcp.
Not able to ping the target
I can nmap my wifi router but not hackthebox systems.
I am using Kali 2017.3 and Virtual Box 6.1

Please help me to solve this …thanks in advance

hey and welcome

first if you not using connection pack you need to download one

two the nmap say’s that the server blocking the ping from nmap try to use this flag -Pn which do the scan without sending pings

three i think your kali version is old

could you tell me what box you are scanning ??

I am scaning Legacy 10.10.10.4 .
Yes my Kali Version is 2017.3 , installed it due to less RAM in my system.
-Pn is not helping me , its taking long time and seems not able to complete the task.
I am using connection pack and i am connected to the system , getting ip address …

bro you are not vip member to scan this box
only vip members can do the retired machines

you can do Open admin and follow ippsec video

Ok in that case i cant do it…so is there any option for free users

@strangerspy said:

Ok in that case i cant do it…so is there any option for free users

You can scan all the active systems or two of the retired boxes (currently OpenAdmin and Control.

You can also download a different connection pack and access the Starting Point servers.

Unfortunately, you cant scan Legacy, but you aren’t missing a huge amount - its a fairly trivial box IIRC, where you scan, run MSF, get system.

many thanks for your suggestion. My query may be foolish but i have just started from today.
I have tested another active machine but facing same challenge…
my nmap version is 7.60
I am not sure if am performing the right steps
i connect open vpn first and then check the connection from access tab. If its showing connected then its good. I have also changed the connection from udp to tcp
then i open active machines and select one machine to get ip and other info.
Then i am trying to perform nmap and other services.
Hope my steps are ok. Let me know if i am missing something…

@strangerspy said:

many thanks for your suggestion. My query may be foolish but i have just started from today.

It’s ok - the question isn’t foolish and everyone is here to learn.

i connect open vpn first and then check the connection from access tab. If its showing connected then its good.

Ok - that’s good. Also run ifconfig on your kali machine and check that tun0 has an IP address.

then i open active machines and select one machine to get ip and other info.
Then i am trying to perform nmap and other services.
Hope my steps are ok. Let me know if i am missing something…

They seem to be correct from what I can see.

Can you paste in the nmap command you are using?

nmap -sC -sV -p- 10.10.10.167
nmap -A -T4 -p- 10.10.10.167
nmap -p$ports -sC -sV 10.10.10.167
there are commands i am using for control system now, but same results.
Yes I tun0 is getting ip address 10.10.16.2 ip address.
Seems some other issue…not able to understand…even getting same results for control systems too :frowning:

i dont think my nmap having any issue as i am able to get results for my wifi ip.
Its only happening for hackthebox systems. I am able to ping hackthebox vpn too.

Can you try traceroute 10.10.10.167 and ping -c3 10.10.10.167 and see what that says?

oot@kali:~/Desktop# ping -c3 10.10.10.171
PING 10.10.10.171 (10.10.10.171) 56(84) bytes of data.
From 10.10.16.1 icmp_seq=1 Destination Host Unreachable
From 10.10.16.1 icmp_seq=2 Destination Host Unreachable
From 10.10.16.1 icmp_seq=3 Destination Host Unreachable

root@kali:~/Desktop# traceroute 10.10.10.171
traceroute to 10.10.10.171 (10.10.10.171), 30 hops max, 60 byte packets
1 10.10.16.1 (10.10.16.1) 350.203 ms 592.194 ms 831.788 ms
2 10.10.16.1 (10.10.16.1) 2693.660 ms !H 3029.337 ms !H 3032.418 ms !H

Are you uaing another vpn, maybe on the host that blocks ipv6? Nordvpn does this…

No I am using as suggested in access rules. Open VPN only, also regenerated the couple of times and changed the connection from udp to tcp.

the server is down today becz crowd is on access try this tomarrow it will work @strangerspy

@strangerspy said:

root@kali:~/Desktop# traceroute 10.10.10.171
traceroute to 10.10.10.171 (10.10.10.171), 30 hops max, 60 byte packets
1 10.10.16.1 (10.10.16.1) 350.203 ms 592.194 ms 831.788 ms
2 10.10.16.1 (10.10.16.1) 2693.660 ms !H 3029.337 ms !H 3032.418 ms !H

I’d try to switch to a different server or regenerate a connection pack.