Thank you very much am03bam4n for this awesome experience and all the content you have created on TryHackMe. You got me highly motivated to continue my open learning paths!
TryHackMe User: 0xb0b
Initial Recon
In the first initial reconnaissance the three public-facing servers were scanned using Nmap.
All three servers running a webserver which will be kind of interesting.
Running with the flags sT (TCP connect scan), sV (version detection and sC (running default Scripts)
WEB 10.200.XXX.13
┌──(0xb0b㉿kali)-[~]└─$nmap-sT-sV-sC10.200.103.13StartingNmap7.93 ( https://nmap.org ) at 2023-05-27 05:37 EDTNmapscanreportfor10.200.103.13Hostisup (0.061s latency).Notshown:998closedtcpports (conn-refused)PORTSTATESERVICEVERSION22/tcpopensshOpenSSH7.6p1Ubuntu4ubuntu0.7 (Ubuntu Linux; protocol2.0)|ssh-hostkey:|204830ef2e2674c471405ef72e354b91b814 (RSA)|256370dcaf79c78d47ed1cac2c5275cb553 (ECDSA)|_256dd6ea494852ce7ab19acdbce54689d7a (ED25519)80/tcpopenhttpApachehttpd2.4.29 ((Ubuntu))|_http-server-header:Apache/2.4.29 (Ubuntu)|_http-title:Sitedoesn't have a title (text/html).Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 10.89 seconds