Rotmg hacked client 27.7.x11
Given the domain name, I’ll fuzz for virtual hosts with wfuzz. There’s a domain name on the TLS certificate, seal.htb. Nmap done: 1 IP address (1 host up) scanned in 15.10 secondsīased on the OpenSSH version, the host is likely running Ubuntu 20.04 Focal. Service Info: OS: Linux CPE: cpe:/o:linux:linux_kernel If you know the service/version, please submit the following fingerprint at : |_http-title: Site doesn't have a title (text/html charset=utf-8).ġ service unrecognized despite returning data. |_ Server returned status 401 but no WWW-Authenticate header. |_ Bad Message 400reason: Illegal character CNTL=0x5 | HTTP/1.1 400 Illegal character CNTL=0x5 | Bad Message 400reason: Illegal character CNTL=0x4 | HTTP/1.1 400 Illegal character CNTL=0x4 | Bad Message 400reason: Illegal character OTEXT=0x80 | Content-Type: text/html charset=iso-8859-1 | HTTP/1.1 400 Illegal character OTEXT=0x80 | Set-Cookie: JSESSIONID=node01q9qys7bogc7sqx9vdtz49od11.node0 Path=/ HttpOnly | Set-Cookie: JSESSIONID=node0drs9zl7mym6gi9hyziw3t1m90.node0 Path=/ HttpOnly | Set-Cookie: JSESSIONID=node0gavl59qm2zrx1qhzhowcumpi72.node0 Path=/ HttpOnly | ssl-cert: Subject: commonName=seal.htb/organizationName=Seal Pvt Ltd/stateOrProvinceName=London/countryName=UK Nmap done: 1 IP address (1 host up) scanned in 109.80 nmap -p 22,443,8080 -sCV -oA scans/nmap-tcpscripts 10.10.10.250Ģ2/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux protocol 2.0) Nmap done: 1 IP address (0 hosts up) scanned in 2.14 nmap -p-min-rate 10000 -oA scans/nmap-alltcp 10.10.10.250 If it is really up, but blocking our ping probes, try -Pn