# Nmap 7.93 scan initiated Wed Feb 1 17:50:14 2023 as: nmap -vv --reason -Pn -T4 -sV -p 80 "--script=banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)" -oN /home/kali/htb/broscience/results/scans/tcp80/tcp_80_http_nmap.txt -oX /home/kali/htb/broscience/results/scans/tcp80/xml/tcp_80_http_nmap.xml 10.10.11.195 Nmap scan report for broscience.htb (10.10.11.195) Host is up, received user-set (0.032s latency). Scanned at 2023-02-01 17:50:14 CET for 41s PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 63 Apache httpd 2.4.54 |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-passwd: ERROR: Script execution failed (use -d to debug) |_http-vuln-cve2013-7091: ERROR: Script execution failed (use -d to debug) |_http-malware-host: Host appears to be clean |_http-server-header: Apache/2.4.54 (Debian) |_http-fetch: Please enter the complete path of the directory to save data in. |_http-referer-checker: Couldn't find any cross-domain scripts. |_http-feed: Couldn't find any feeds. |_http-title: Did not follow redirect to https://broscience.htb/ | http-useragent-tester: | Status for browser useragent: 200 | Redirected To: https://broscience.htb/ | Allowed User Agents: | Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html) | libwww | lwp-trivial | libcurl-agent/1.0 | PHP/ | Python-urllib/2.5 | GT::WWW | Snoopy | MFC_Tear_Sample | HTTP::Lite | PHPCrawl | URI::Fetch | Zend_Http_Client | http client | PECL::HTTP | Wget/1.13.4 (linux-gnu) |_ WWW-Mechanize/1.34 |_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable |_http-mobileversion-checker: No mobile version detected. |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit= for deeper analysis) | http-vhosts: |_128 names had status 301 |_http-comments-displayer: Couldn't find any comments. |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages. |_http-csrf: Couldn't find any CSRF vulnerabilities. | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-sitemap-generator: | Directory structure: | Longest directory structure: | Depth: 0 | Dir: / | Total files found (by extension): |_ | http-security-headers: | Cache_Control: | Header: Cache-Control: no-store, no-cache, must-revalidate | Pragma: | Header: Pragma: no-cache | Expires: |_ Header: Expires: Thu, 19 Nov 1981 08:52:00 GMT |_http-chrono: Request times for /; avg: 307.69ms; min: 157.39ms; max: 507.13ms |_http-jsonp-detection: Couldn't find any JSONP endpoints. | http-headers: | Date: Wed, 01 Feb 2023 16:50:40 GMT | Server: Apache/2.4.54 (Debian) | Location: https://broscience.htb/ | Content-Length: 311 | Connection: close | Content-Type: text/html; charset=iso-8859-1 | |_ (Request type: GET) |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number= for deeper analysis) |_http-errors: Couldn't find any error pages. |_http-date: Wed, 01 Feb 2023 16:50:32 GMT; 0s from local time. |_http-config-backup: ERROR: Script execution failed (use -d to debug) |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Feb 1 17:50:55 2023 -- 1 IP address (1 host up) scanned in 41.47 seconds