Network Recon
Difficulty: Beginner
Interpret a safe, static nmap output. Copy exact answers from the scan to capture flags.
New to recon? Read the Network Recon tutorial
Context
You’re helping inventory exposed services. A teammate ran a scan on a demo host. Review the results and extract key facts.
Task
- Read the scan output below (static, safe example).
- Identify the target IP, web server version, and any filtered port.
- Copy those values as flags to complete the challenge.
Scan Output (nmap)
Answers are directly copy-pasteable from this block.
Capture the Flags
Copy each answer directly from the scan above (or wrap it like CXA{...}). Case-insensitive.
0/3 flags captured
Flag 1 — What IP was scanned?
Hint: It appears in parentheses after the host name on the “scan report for” line.
Flag 2 — Which web server/version is running?
Hint: Look at 80/tcp or NNN/xxx rows (HTTP/HTTPS). Copy the two-word value exactly.
Flag 3 — Which port is filtered?
Hint: It’s the MySQL port; copy it in the format port/proto.