Network Recon

Difficulty: Beginner

Interpret a safe, static nmap output. Copy exact answers from the scan to capture flags.

New to recon? Read the Network Recon tutorial

Context

You’re helping inventory exposed services. A teammate ran a scan on a demo host. Review the results and extract key facts.

Task

  1. Read the scan output below (static, safe example).
  2. Identify the target IP, web server version, and any filtered port.
  3. Copy those values as flags to complete the challenge.

Scan Output (nmap)

Answers are directly copy-pasteable from this block.

Note: Educational example — do not scan systems you don’t own or have permission to test.

Capture the Flags

Copy each answer directly from the scan above (or wrap it like CXA{...}). Case-insensitive.

0/3 flags captured

Flag 1 — What IP was scanned?

Question: Copy the target IP address shown in the scan report.

Flag 2 — Which web server/version is running?

Question: Copy the exact service + version for the web server.

Flag 3 — Which port is filtered?

Question: Copy the exact port/proto marked as filtered.

Back to Challenges