Security Consultant & Pentester
Kyle Woodward
@KyleInCyber
I do cyber things with cyber people.
Breaking stuff (ethically) so you don't have to find out the hard way.
nmap -A kyleincyber.com
Starting Nmap 7.94 ( https://nmap.org )
Host is up (obviously, you're looking at it)
Not shown: 998 closed ports (skill issue)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH (no you can't)
80/tcp open http nginx (redirects to https, nice try)
443/tcp open https nginx (yeah it's encrypted, cope)
1337/tcp open hacker h4x0r v0.0.42
4444/tcp closed shell go away
OS DETECTION:
Running: Linux (btw)
SCRIPT RESULTS:
|_http-title: KyleInCyber
| http-security-headers: maybe configured
| ssl-cert: valid (unlike your methodology)
|_http-robots.txt: no entry for /flag.txt (you checked didn't you)
WARNING: Nmap may have frightened the server.
Nmap done: 1 IP address (1 host up)
scanned in 0.42s (faster than your recon)