I have been getting this error message on free membership:
Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-17 06:54 EST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.31 seconds
So i upgraded to VIP, changed my settings in OVPN but am still getting the same error message. When I try -Pn, I just get:
Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-17 06:48 EST
Nmap scan report for 10.10.10.3
Host is up (2.9s latency).
All 1000 scanned ports on 10.10.10.3 are filtered
Nmap done: 1 IP address (1 host up) scanned in 82.07 seconds
When I switch back to UDP and run nmap I get the following:
Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-17 09:03 EST
Nmap scan report for 10.10.10.3
Host is up (0.034s latency).
Not shown: 991 filtered ports
PORT STATE SERVICE VERSION
21/tcp open tcpwrapped
22/tcp open tcpwrapped
80/tcp open tcpwrapped
110/tcp open tcpwrapped
139/tcp open tcpwrapped
143/tcp open tcpwrapped
445/tcp open tcpwrapped
993/tcp open tcpwrapped
995/tcp open tcpwrapped
There is still some underlying issue and I think it’s to do with the TCP settings. I have managed to find the exploit on the Lame box but when I run the exploit it says ‘Exploit COmpleted, but no session was created’
I had a similar issue to this when I was first making my HTB/pen-testing box, the issue was that I forgot to disable UFW(firewall), so the returning packets were getting blocked.
I don’t know what your setup is, but it could be something to look into.
You can check UFW with ‘sudo systemctl status ufw’, or maybe check iptables if you have that set up.