aboutsummaryrefslogtreecommitdiff
path: root/attackiveDirectory/initial
diff options
context:
space:
mode:
Diffstat (limited to 'attackiveDirectory/initial')
-rw-r--r--attackiveDirectory/initial54
1 files changed, 54 insertions, 0 deletions
diff --git a/attackiveDirectory/initial b/attackiveDirectory/initial
new file mode 100644
index 0000000..6967939
--- /dev/null
+++ b/attackiveDirectory/initial
@@ -0,0 +1,54 @@
+# Nmap 7.80 scan initiated Wed Mar 2 15:19:09 2022 as: nmap -sC -sV -oN initial 10.10.86.193
+Nmap scan report for 10.10.86.193
+Host is up (0.18s latency).
+Not shown: 987 closed ports
+PORT STATE SERVICE VERSION
+53/tcp open domain?
+| fingerprint-strings:
+| DNSVersionBindReqTCP:
+| version
+|_ bind
+80/tcp open http Microsoft IIS httpd 10.0
+| http-methods:
+|_ Potentially risky methods: TRACE
+|_http-server-header: Microsoft-IIS/10.0
+|_http-title: IIS Windows Server
+88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-03-02 09:49:36Z)
+135/tcp open msrpc Microsoft Windows RPC
+139/tcp open netbios-ssn Microsoft Windows netbios-ssn
+389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)
+445/tcp open microsoft-ds?
+464/tcp open kpasswd5?
+593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
+636/tcp open tcpwrapped
+3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)
+3269/tcp open tcpwrapped
+3389/tcp open ms-wbt-server Microsoft Terminal Services
+| rdp-ntlm-info:
+| Target_Name: THM-AD
+| NetBIOS_Domain_Name: THM-AD
+| NetBIOS_Computer_Name: ATTACKTIVEDIREC
+| DNS_Domain_Name: spookysec.local
+| DNS_Computer_Name: AttacktiveDirectory.spookysec.local
+| Product_Version: 10.0.17763
+|_ System_Time: 2022-03-02T09:51:58+00:00
+| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local
+| Not valid before: 2022-03-01T09:47:25
+|_Not valid after: 2022-08-31T09:47:25
+|_ssl-date: 2022-03-02T09:52:14+00:00; 0s from scanner time.
+1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
+SF-Port53-TCP:V=7.80%I=7%D=3/2%Time=621F3DB4%P=x86_64-pc-linux-gnu%r(DNSVe
+SF:rsionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\x
+SF:04bind\0\0\x10\0\x03");
+Service Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windows
+
+Host script results:
+| smb2-security-mode:
+| 2.02:
+|_ Message signing enabled and required
+| smb2-time:
+| date: 2022-03-02T09:52:02
+|_ start_date: N/A
+
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+# Nmap done at Wed Mar 2 15:24:15 2022 -- 1 IP address (1 host up) scanned in 305.82 seconds