# Nmap 7.93 scan initiated Tue Feb 21 09:06:59 2023 as: nmap -sV -sC -oA nmapscan bagel.htb Nmap scan report for bagel.htb Host is up (0.052s latency). Not shown: 997 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.8 (protocol 2.0) | ssh-hostkey: | 256 6e4e1341f2fed9e0f7275bededcc68c2 (ECDSA) |_ 256 80a7cd10e72fdb958b869b1b20652a98 (ED25519) 5000/tcp open upnp? | fingerprint-strings: | GetRequest: | HTTP/1.1 400 Bad Request | Server: Microsoft-NetCore/2.0 | Date: Tue, 21 Feb 2023 14:07:25 GMT | Connection: close | HTTPOptions: | HTTP/1.1 400 Bad Request | Server: Microsoft-NetCore/2.0 | Date: Tue, 21 Feb 2023 14:07:40 GMT | Connection: close | Help: | HTTP/1.1 400 Bad Request | Content-Type: text/html | Server: Microsoft-NetCore/2.0 | Date: Tue, 21 Feb 2023 14:07:50 GMT | Content-Length: 52 | Connection: close | Keep-Alive: true |

Bad Request (Invalid request line (parts).)

| RTSPRequest: | HTTP/1.1 400 Bad Request | Content-Type: text/html | Server: Microsoft-NetCore/2.0 | Date: Tue, 21 Feb 2023 14:07:25 GMT | Content-Length: 54 | Connection: close | Keep-Alive: true |

Bad Request (Invalid request line (version).)

| SSLSessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/html | Server: Microsoft-NetCore/2.0 | Date: Tue, 21 Feb 2023 14:07:51 GMT | Content-Length: 52 | Connection: close | Keep-Alive: true |_

Bad Request (Invalid request line (parts).)

8000/tcp open http-alt Werkzeug/2.2.2 Python/3.10.9 |_http-server-header: Werkzeug/2.2.2 Python/3.10.9 | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 NOT FOUND | Server: Werkzeug/2.2.2 Python/3.10.9 | Date: Tue, 21 Feb 2023 14:07:25 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 207 | Connection: close | | | 404 Not Found |

Not Found

|

The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.

| GetRequest: | HTTP/1.1 302 FOUND | Server: Werkzeug/2.2.2 Python/3.10.9 | Date: Tue, 21 Feb 2023 14:07:20 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 263 | Location: http://bagel.htb:8000/?page=index.html | Connection: close | | | Redirecting... |

Redirecting...

|

You should be redirected automatically to the target URL: http://bagel.htb:8000/?page=index.html. If not, click the link. | Socks5: | | | | | Error response | | |

Error response

|

Error code: 400

|

Message: Bad request syntax (' | ').

|

Error code explanation: HTTPStatus.BAD_REQUEST - Bad request syntax or unsupported method.

| |_ |_http-title: Did not follow redirect to http://bagel.htb:8000/?page=index.html 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port5000-TCP:V=7.93%I=7%D=2/21%Time=63F4D01E%P=x86_64-pc-linux-gnu%r(Ge SF:tRequest,73,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20Microsoft SF:-NetCore/2\.0\r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2014:07:25\x20GMT\ SF:r\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,E8,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nContent-Type:\x20text/html\r\nServer:\x20Microsoft-N SF:etCore/2\.0\r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2014:07:25\x20GMT\r\ SF:nContent-Length:\x2054\r\nConnection:\x20close\r\nKeep-Alive:\x20true\r SF:\n\r\n

Bad\x20Request\x20\(Invalid\x20request\x20line\x20\(version\) SF:\.\)

")%r(HTTPOptions,73,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer SF:ver:\x20Microsoft-NetCore/2\.0\r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2 SF:014:07:40\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(Help,E6,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\nServer:\x20M SF:icrosoft-NetCore/2\.0\r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2014:07:50 SF:\x20GMT\r\nContent-Length:\x2052\r\nConnection:\x20close\r\nKeep-Alive: SF:\x20true\r\n\r\n

Bad\x20Request\x20\(Invalid\x20request\x20line\x20\ SF:(parts\)\.\)

")%r(SSLSessionReq,E6,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nContent-Type:\x20text/html\r\nServer:\x20Microsoft-NetCore/2\.0\ SF:r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2014:07:51\x20GMT\r\nContent-Len SF:gth:\x2052\r\nConnection:\x20close\r\nKeep-Alive:\x20true\r\n\r\n

Ba SF:d\x20Request\x20\(Invalid\x20request\x20line\x20\(parts\)\.\)

")%r( SF:TerminalServerCookie,E6,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent- SF:Type:\x20text/html\r\nServer:\x20Microsoft-NetCore/2\.0\r\nDate:\x20Tue SF:,\x2021\x20Feb\x202023\x2014:07:51\x20GMT\r\nContent-Length:\x2052\r\nC SF:onnection:\x20close\r\nKeep-Alive:\x20true\r\n\r\n

Bad\x20Request\x2 SF:0\(Invalid\x20request\x20line\x20\(parts\)\.\)

")%r(TLSSessionReq,E SF:6,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\n SF:Server:\x20Microsoft-NetCore/2\.0\r\nDate:\x20Tue,\x2021\x20Feb\x202023 SF:\x2014:07:51\x20GMT\r\nContent-Length:\x2052\r\nConnection:\x20close\r\ SF:nKeep-Alive:\x20true\r\n\r\n

Bad\x20Request\x20\(Invalid\x20request\ SF:x20line\x20\(parts\)\.\)

"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8000-TCP:V=7.93%I=7%D=2/21%Time=63F4D019%P=x86_64-pc-linux-gnu%r(Ge SF:tRequest,1EA,"HTTP/1\.1\x20302\x20FOUND\r\nServer:\x20Werkzeug/2\.2\.2\ SF:x20Python/3\.10\.9\r\nDate:\x20Tue,\x2021\x20Feb\x202023\x2014:07:20\x2 SF:0GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length: SF:\x20263\r\nLocation:\x20http://bagel\.htb:8000/\?page=index\.html\r\nCo SF:nnection:\x20close\r\n\r\n\n\nRedirecting\.\.\.\n

Redirecting\.\.\.

\n

You\x20shoul SF:d\x20be\x20redirected\x20automatically\x20to\x20the\x20target\x20URL:\x SF:20http://bagel SF:\.htb:8000/\?page=index\.html\.\x20If\x20not,\x20click\x20the\x20li SF:nk\.\n")%r(FourOhFourRequest,184,"HTTP/1\.1\x20404\x20NOT\x20FOUND\r\nS SF:erver:\x20Werkzeug/2\.2\.2\x20Python/3\.10\.9\r\nDate:\x20Tue,\x2021\x2 SF:0Feb\x202023\x2014:07:25\x20GMT\r\nContent-Type:\x20text/html;\x20chars SF:et=utf-8\r\nContent-Length:\x20207\r\nConnection:\x20close\r\n\r\n\n\n404\x20Not\x20Found\n< SF:h1>Not\x20Found\n

The\x20requested\x20URL\x20was\x20not\x20found SF:\x20on\x20the\x20server\.\x20If\x20you\x20entered\x20the\x20URL\x20manu SF:ally\x20please\x20check\x20your\x20spelling\x20and\x20try\x20again\.

\n")%r(Socks5,213,"\n\n\x20\x20\x20\x20\n\x20\x20\x20\ SF:x20\x20\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20Error\ SF:x20response\n\x20\x20\x20\x20\n\x20\x20\x20\x20\n\ SF:x20\x20\x20\x20\x20\x20\x20\x20

Error\x20response

\n\x20\x20\x20 SF:\x20\x20\x20\x20\x20

Error\x20code:\x20400

\n\x20\x20\x20\x20\x20\ SF:x20\x20\x20

Message:\x20Bad\x20request\x20syntax\x20\('\\x05\\x04\\x0 SF:0\\x01\\x02\\x80\\x05\\x01\\x00\\x03'\)\.

\n\x20\x20\x20\x20\x20\x20 SF:\x20\x20

Error\x20code\x20explanation:\x20HTTPStatus\.BAD_REQUEST\x20 SF:-\x20Bad\x20request\x20syntax\x20or\x20unsupported\x20method\.

\n\x2 SF:0\x20\x20\x20\n\n"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Tue Feb 21 09:08:57 2023 -- 1 IP address (1 host up) scanned in 118.34 seconds