Firewall and IDS/IPS Evasion - Hard Lab
$ nmap 10.xx.xx.xx -p- -sSV -Pn -n --disable-arp-ping --source-port 53 --script=banner
Starting Nmap 7.93 ( https://nmap.org ) at 2025-06-18 16:59 CEST
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
|_banner: SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.7
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
50000/tcp open tcpwrapped
Nmap done: 1 IP address (1 host up) scanned in 57.23 seconds$ nc -nv --source-port 53 10.xx.xx.xx 50000
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Connected to 10.xx.xx.xx:50000.
220 HTB{kjnsdf2n982n1827eh76238s98di1w6}Last updated