nmap -sV -sC -v 10.49.141.45 Starting Nmap 7.95 ( https://nmap.org ) at 2026-02-07 03:16 EST NSE: Loaded 157 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Initiating Ping Scan at 03:16 Scanning 10.49.141.45 [4 ports] Completed Ping Scan at 03:16, 0.22s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 03:16 Completed Parallel DNS resolution of 1 host. at 03:16, 0.04s elapsed Initiating SYN Stealth Scan at 03:16 Scanning 10.49.141.45 [1000 ports] Discovered open port 22/tcp on 10.49.141.45 Discovered open port 80/tcp on 10.49.141.45 Completed SYN Stealth Scan at 03:16, 17.15s elapsed (1000 total ports) Initiating Service scan at 03:16 Scanning 2 services on 10.49.141.45 Completed Service scan at 03:16, 6.42s elapsed (2 services on 1 host) NSE: Script scanning 10.49.141.45. Initiating NSE at 03:16 Completed NSE at 03:16, 5.33s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.79s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Nmap scan report for 10.49.141.45 Host is up (0.20s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.7 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 57:2c:43:78:0c:d3:13:5b:8d:83:df:63:cf:53:61:91 (ECDSA) |_ 256 45:e1:3c:eb:a6:2d:d7:c6:bb:43:24:7e:02:e9:11:39 (ED25519) 80/tcp open http Apache httpd 2.4.59 ((Debian)) |_http-server-header: Apache/2.4.59 (Debian) |_http-title: Did not follow redirect to / | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning. Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Initiating NSE at 03:16 Completed NSE at 03:16, 0.00s elapsed Read data files from: /usr/share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 30.22 seconds Raw packets sent: 1146 (50.400KB) | Rcvd: 1111 (44.436KB)
if ( isset($_COOKIE['secure_cookie']) && isset($_COOKIE['user'])) {
$user=$_COOKIE['user'];
if (verify_cookie($ENC_SECRET_KEY)) {
if ($user === "admin") {
echo'congrats: ******flag here******. Now I want the key.';
} else {
$length=strlen($_SERVER['HTTP_USER_AGENT']); print"<p>You are logged in as " . $user . ":" . str_repeat("*", $length) . "\n"; print"<p>SSO cookie is protected with traditional military grade en<b>crypt</b>ion\n"; }