nmap -p 80,3690,5985 -sV --script=vuln worker.htb Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-17 08:21 UTC Nmap scan report for worker.htb (10.129.50.115) Host is up (0.23s latency).
PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-server-header: Microsoft-IIS/10.0 |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 3690/tcp open svnserve Subversion |_clamav-exec: ERROR: Script execution failed (use -d to debug) 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 1056.00 seconds
steps: - script: echo This runs in the default shell on any machine - bash: | echo This multiline script always runs in Bash. echo Even on Windows machines! - pwsh: | Write-Host "This multiline script always runs in PowerShell Core." Write-Host "Even on non-Windows machines!"