SHARE
TWEET

Untitled

a guest Oct 19th, 2019 102 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 53/tcp    open  domain       Microsoft DNS
  2. 88/tcp    open  kerberos-sec Microsoft Windows Kerberos (server time: 2019-10-19 21:05:41Z)
  3. 135/tcp   open  msrpc        Microsoft Windows RPC
  4. 139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn
  5. 389/tcp   open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
  6. 445/tcp   open  microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: HTB)
  7. 464/tcp   open  kpasswd5?
  8. 593/tcp   open  ncacn_http   Microsoft Windows RPC over HTTP 1.0
  9. 636/tcp   open  tcpwrapped
  10. 3268/tcp  open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
  11. 3269/tcp  open  tcpwrapped
  12. 5985/tcp  open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  13. |_http-server-header: Microsoft-HTTPAPI/2.0
  14. |_http-title: Not Found
  15. 9389/tcp  open  mc-nmf       .NET Message Framing
  16. 47001/tcp open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  17. |_http-server-header: Microsoft-HTTPAPI/2.0
  18. |_http-title: Not Found
  19. 49664/tcp open  msrpc        Microsoft Windows RPC
  20. 49665/tcp open  msrpc        Microsoft Windows RPC
  21. 49666/tcp open  msrpc        Microsoft Windows RPC
  22. 49667/tcp open  msrpc        Microsoft Windows RPC
  23. 49670/tcp open  tcpwrapped
  24. 49674/tcp open  tcpwrapped
  25. 49675/tcp open  tcpwrapped
  26. 49676/tcp open  ncacn_http   Microsoft Windows RPC over HTTP 1.0
  27. 49682/tcp open  tcpwrapped
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top