Advertisement
Guest User

192.168.154.2 vulnerability scan

a guest
Dec 12th, 2019
440
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.82 KB | None | 0 0
  1. Nmap scan report for 192.168.154.2
  2. Host is up (0.00041s latency).
  3. Not shown: 983 filtered ports
  4. PORT STATE SERVICE VERSION
  5. 53/tcp open domain?
  6. | fingerprint-strings:
  7. | DNSVersionBindReqTCP:
  8. | version
  9. |_ bind
  10. 80/tcp open http Microsoft IIS httpd 8.5
  11. | http-methods:
  12. |_ Potentially risky methods: TRACE
  13. |_http-server-header: Microsoft-IIS/8.5
  14. |_http-title: IIS Windows Server
  15. 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2019-12-13 01:09:31Z)
  16. 135/tcp open msrpc Microsoft Windows RPC
  17. 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
  18. 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: tophat.thinc, Site: Default-First-Site-Name)
  19. 445/tcp open microsoft-ds Windows Server 2012 R2 Standard 9600 microsoft-ds (workgroup: TOPHAT)
  20. 464/tcp open kpasswd5?
  21. 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  22. 636/tcp open tcpwrapped
  23. 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: tophat.thinc, Site: Default-First-Site-Name)
  24. 3269/tcp open tcpwrapped
  25. 49154/tcp open msrpc Microsoft Windows RPC
  26. 49155/tcp open msrpc Microsoft Windows RPC
  27. 49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  28. 49158/tcp open msrpc Microsoft Windows RPC
  29. 49159/tcp open msrpc Microsoft Windows RPC
  30. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  31. SF-Port53-TCP:V=7.80%I=7%D=12/12%Time=5DF2E4CF%P=x86_64-pc-linux-gnu%r(DNS
  32. SF:VersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version
  33. SF:\x04bind\0\0\x10\0\x03");
  34. MAC Address: 00:0C:29:AE:27:FA (VMware)
  35. Service Info: Host: LAN-DC; OS: Windows; CPE: cpe:/o:microsoft:windows
  36.  
  37. Host script results:
  38. |_clock-skew: mean: 1h40m00s, deviation: 2h53m12s, median: 0s
  39. |_nbstat: NetBIOS name: LAN-DC, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:ae:27:fa (VMware)
  40. | smb-os-discovery:
  41. | OS: Windows Server 2012 R2 Standard 9600 (Windows Server 2012 R2 Standard 6.3)
  42. | OS CPE: cpe:/o:microsoft:windows_server_2012::-
  43. | Computer name: LAN-DC
  44. | NetBIOS computer name: LAN-DC\x00
  45. | Domain name: tophat.thinc
  46. | Forest name: tophat.thinc
  47. | FQDN: LAN-DC.tophat.thinc
  48. |_ System time: 2019-12-12T20:11:46-05:00
  49. | smb-security-mode:
  50. | account_used: guest
  51. | authentication_level: user
  52. | challenge_response: supported
  53. |_ message_signing: required
  54. | smb2-security-mode:
  55. | 2.02:
  56. |_ Message signing enabled and required
  57. | smb2-time:
  58. | date: 2019-12-13T01:11:46
  59. |_ start_date: 2019-12-13T01:04:28
  60.  
  61. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  62. Nmap done: 1 IP address (1 host up) scanned in 210.86 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement