Sau
Information Gathering
Ports and Services
┌──(kali㉿kali)-[~/ctf/sau]
└─$ nmap -p- -sV 10.10.11.224 --min-rate 1000
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-14 12:34 WIB
Stats: 0:00:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 99.99% done; ETC: 12:34 (0:00:00 remaining)
Stats: 0:00:17 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 50.00% done; ETC: 12:35 (0:00:06 remaining)
Nmap scan report for 10.10.11.224
Host is up (0.090s latency).
Not shown: 65531 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
80/tcp filtered http
8338/tcp filtered unknown
55555/tcp open http Golang net/http server
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
https://sploitus.com/exploit?id=6BAA524E-16EA-562C-804B-113B8244C6EA (CVE-2023-27163
)

Priv esc
This invokes the default pager, which is likely to be less, other functions may apply.
Last updated