After getting connected to the SOHOplesslyBroken VPN, we did an nmap scan of the local IP range for any devices. This as an update to show what flags have already been captured.
nmap 192.168.10.0/24
Control4 Open Source Software Notice
PORT | STATE | SERVICE |
---|---|---|
21/tcp | closed | ftp |
22/tcp | closed | ssh |
80/tcp | open | http |
Current State: Has not been accessed. Possible vulnerability in ssh used by server (dropbear).
Link Clicker
PORT | STATE | SERVICE |
---|---|---|
80/tcp | open | http |
No flag, is used as a link clicker that will access any url provided to it.
NUUO Network Video Recorder
PORT | STATE | SERVICE |
---|---|---|
21/tcp | open | ftp |
22/tcp | open | ssh |
80/tcp | open | http |
443/tcp | open | https |
Current State: Flag has been captured.
Any time & Any where, IP Surveillance for Your Life
PORT | STATE | SERVICE |
---|---|---|
80/tcp | open | http |
554/tcp | open | rtsp |
Current State: Flag not captured. It is likely a DVR that might have vulnerabilities.
GEO Vision - GV-SNVR0811
PORT | STATE | SERVICE |
---|---|---|
80/tcp | open | http |
443/tcp | open | https |
10000/tcp | open | snet-sensor-mgmt |
Current State: Flag Captured.
192.168.10.208
url: http://192.168.10.208/login
PORT | STATE | SERVICE |
---|---|---|
22/tcp | open | ssh |
80/tcp | open | http |
113/tcp | closed | ident |
443/tcp | open | https |
541/tcp | open | uucp-rlogin |
8000/tcp | closed | http-alt |
8009/tcp | open | ajp13 |
Current State: This was a fortinet machine. Flag Captured.
DCS-930LB1
PORT | STATE | SERVICE |
---|---|---|
23/tcp | open | telnet |
80/tcp | open | http |
443/tcp | open | https |
749/tcp | filtered | kerberos-adm |
4444/tcp | open | krb524 |
Current State: No new information on this machine.