# Nmap 7.93 scan initiated Fri Jan 27 10:42:19 2023 as: nmap -vv --reason -Pn -T4 -sV -p 80 "--script=banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)" -oN /home/kali/htb/soccer/results/scans/tcp80/tcp_80_http_nmap.txt -oX /home/kali/htb/soccer/results/scans/tcp80/xml/tcp_80_http_nmap.xml 10.10.11.194 Nmap scan report for soccer.htb (10.10.11.194) Host is up, received user-set (0.026s latency). Scanned at 2023-01-27 10:42:19 CET for 70s Bug in http-security-headers: no string output. PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack nginx 1.18.0 (Ubuntu) |_http-fetch: Please enter the complete path of the directory to save data in. | http-referer-checker: | Spidering limited to: maxpagecount=30 | https://cdn.jsdelivr.net:443/npm/bootstrap15.2.2/dist/js/bootstrap.bundle.min.js | http://maxcdn.bootstrapcdn.com:80/bootstrap/4.1.1/js/bootstrap.min.js | http://cdnjs.cloudflare.com:80/ajax/libs/jquery/3.2.1/jquery.min.js |_ https://ajax.googleapis.com:443/ajax/libs/jquery/3.6.0/jquery.min.js |_http-chrono: Request times for /; avg: 167.91ms; min: 157.46ms; max: 176.69ms |_http-mobileversion-checker: No mobile version detected. | http-sitemap-generator: | Directory structure: | / | Other: 1; jpg: 4 | Longest directory structure: | Depth: 0 | Dir: / | Total files found (by extension): |_ Other: 1; jpg: 4 |_http-dombased-xss: Couldn't find any DOM based XSS. | http-headers: | Server: nginx/1.18.0 (Ubuntu) | Date: Fri, 27 Jan 2023 09:42:28 GMT | Content-Type: text/html | Content-Length: 6917 | Last-Modified: Thu, 17 Nov 2022 08:07:11 GMT | Connection: close | ETag: "6375ebaf-1b05" | Accept-Ranges: bytes | |_ (Request type: HEAD) | http-vuln-cve2011-3192: | VULNERABLE: | Apache byterange filter DoS | State: VULNERABLE | IDs: CVE:CVE-2011-3192 BID:49303 | The Apache web server is vulnerable to a denial of service attack when numerous | overlapping byte ranges are requested. | Disclosure date: 2011-08-19 | References: | https://seclists.org/fulldisclosure/2011/Aug/175 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 | https://www.securityfocus.com/bid/49303 |_ https://www.tenable.com/plugins/nessus/55976 |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages. |_http-jsonp-detection: Couldn't find any JSONP endpoints. | http-comments-displayer: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=soccer.htb | | Path: http://soccer.htb:80/ | Line number: 145 | Comment: | | | Path: http://soccer.htb:80/ | Line number: 142 | Comment: | | | Path: http://soccer.htb:80/ | Line number: 106 | Comment: |_ | http-vhosts: |_128 names had status 301 |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit= for deeper analysis) |_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-php-version: Logo query returned unknown hash ad6ef659069e5f1721a5932f71942408 |_Credits query returned unknown hash ad6ef659069e5f1721a5932f71942408 |_http-title: Soccer - Index |_http-errors: Couldn't find any error pages. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-exif-spider: ERROR: Script execution failed (use -d to debug) |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number= for deeper analysis) |_http-date: Fri, 27 Jan 2023 09:42:28 GMT; 0s from local time. | http-useragent-tester: | Status for browser useragent: 200 | Allowed User Agents: | Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html) | libwww | lwp-trivial | libcurl-agent/1.0 | PHP/ | Python-urllib/2.5 | GT::WWW | Snoopy | MFC_Tear_Sample | HTTP::Lite | PHPCrawl | URI::Fetch | Zend_Http_Client | http client | PECL::HTTP | Wget/1.13.4 (linux-gnu) |_ WWW-Mechanize/1.34 |_http-server-header: nginx/1.18.0 (Ubuntu) |_http-config-backup: ERROR: Script execution failed (use -d to debug) |_http-feed: Couldn't find any feeds. |_http-malware-host: Host appears to be clean | http-methods: |_ Supported Methods: GET HEAD |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Fri Jan 27 10:43:30 2023 -- 1 IP address (1 host up) scanned in 70.83 seconds