diff options
Diffstat (limited to 'attackiveDirectory/initial')
| -rw-r--r-- | attackiveDirectory/initial | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/attackiveDirectory/initial b/attackiveDirectory/initial new file mode 100644 index 0000000..6967939 --- /dev/null +++ b/attackiveDirectory/initial @@ -0,0 +1,54 @@ +# Nmap 7.80 scan initiated Wed Mar 2 15:19:09 2022 as: nmap -sC -sV -oN initial 10.10.86.193 +Nmap scan report for 10.10.86.193 +Host is up (0.18s latency). +Not shown: 987 closed ports +PORT STATE SERVICE VERSION +53/tcp open domain? +| fingerprint-strings: +| DNSVersionBindReqTCP: +| version +|_ bind +80/tcp open http Microsoft IIS httpd 10.0 +| http-methods: +|_ Potentially risky methods: TRACE +|_http-server-header: Microsoft-IIS/10.0 +|_http-title: IIS Windows Server +88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-03-02 09:49:36Z) +135/tcp open msrpc Microsoft Windows RPC +139/tcp open netbios-ssn Microsoft Windows netbios-ssn +389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name) +445/tcp open microsoft-ds? +464/tcp open kpasswd5? +593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 +636/tcp open tcpwrapped +3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name) +3269/tcp open tcpwrapped +3389/tcp open ms-wbt-server Microsoft Terminal Services +| rdp-ntlm-info: +| Target_Name: THM-AD +| NetBIOS_Domain_Name: THM-AD +| NetBIOS_Computer_Name: ATTACKTIVEDIREC +| DNS_Domain_Name: spookysec.local +| DNS_Computer_Name: AttacktiveDirectory.spookysec.local +| Product_Version: 10.0.17763 +|_ System_Time: 2022-03-02T09:51:58+00:00 +| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local +| Not valid before: 2022-03-01T09:47:25 +|_Not valid after: 2022-08-31T09:47:25 +|_ssl-date: 2022-03-02T09:52:14+00:00; 0s from scanner time. +1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : +SF-Port53-TCP:V=7.80%I=7%D=3/2%Time=621F3DB4%P=x86_64-pc-linux-gnu%r(DNSVe +SF:rsionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\x +SF:04bind\0\0\x10\0\x03"); +Service Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windows + +Host script results: +| smb2-security-mode: +| 2.02: +|_ Message signing enabled and required +| smb2-time: +| date: 2022-03-02T09:52:02 +|_ start_date: N/A + +Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . +# Nmap done at Wed Mar 2 15:24:15 2022 -- 1 IP address (1 host up) scanned in 305.82 seconds |
