root@htb:~$sudonmap-sV-T4{targetIP}-p-PORTSTATESERVICEVERSION8080/tcpopenhttpJetty9.4.39.v20210325*Typically'-sV'isusedwithNmaptodetermineversions,butthat's not always enough. - adding the -sC is another good way to determine service versions - the -sC option will run safe scripts which are designed to provide useful information without being too intrusive or causing harm to the target systems.
VULNERABILITY SCANNING
root@htb:~$nmap-sV-sC-T4{targetIP}-p8080PORTSTATESERVICEVERSION8080/tcpopenhttpJetty9.4.39.v20210325|_http-title:Sitedoesn't have a title (text/html;charset=utf-8). |_http-server-header: Jetty(9.4.39.v20210325) | http-robots.txt: 1 disallowed entry |_/ * the -SC runs the default set of Nmap scripts (NSE scripts), which typically include scripts for service enumeration, version detection, and other basic checks.root@htb:~$ sudo nmap --script=vuln {targetIP} -p 8080 PORT STATE SERVICE 8080/tcp open http-proxy | http-enum: |_ /robots.txt: Robots file * the --script=vuln will run scripts that focus specifically on detecting known vulnerabilities in the service running on port 6379 - e.g., weak configurations, or known vulnerabilities in the redis service - if no results are found then the service may be fully patched!