1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
| root@JIYE:~/tryhackme/blue# nmap -sC -vv --script=vuln 10.10.246.255 -oN nmap.demo Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-15 05:38 EST NSE: Loaded 105 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 05:38 Completed NSE at 05:38, 10.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 05:38 Completed NSE at 05:38, 0.00s elapsed Initiating Ping Scan at 05:38 Scanning 10.10.246.255 [4 ports] Completed Ping Scan at 05:38, 0.30s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 05:38 Completed Parallel DNS resolution of 1 host. at 05:38, 0.02s elapsed Initiating SYN Stealth Scan at 05:38 Scanning 10.10.246.255 [1000 ports] Discovered open port 445/tcp on 10.10.246.255 Discovered open port 3389/tcp on 10.10.246.255 Discovered open port 139/tcp on 10.10.246.255 Discovered open port 135/tcp on 10.10.246.255 Discovered open port 49154/tcp on 10.10.246.255 Discovered open port 49159/tcp on 10.10.246.255 Discovered open port 49153/tcp on 10.10.246.255 Discovered open port 49158/tcp on 10.10.246.255 Discovered open port 49152/tcp on 10.10.246.255 Completed SYN Stealth Scan at 05:39, 46.22s elapsed (1000 total ports) NSE: Script scanning 10.10.246.255. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 05:39 NSE: [ssl-ccs-injection 10.10.246.255:3389] No response from server: ERROR NSE Timing: About 88.47% done; ETC: 05:39 (0:00:04 remaining) NSE Timing: About 89.08% done; ETC: 05:40 (0:00:07 remaining) Completed NSE at 05:40, 90.23s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 05:40 Completed NSE at 05:40, 0.00s elapsed Nmap scan report for 10.10.246.255 Host is up, received echo-reply ttl 127 (0.25s latency). Scanned at 2021-01-15 05:38:32 EST for 136s Not shown: 991 closed ports Reason: 991 resets PORT STATE SERVICE REASON 135/tcp open msrpc syn-ack ttl 127 139/tcp open netbios-ssn syn-ack ttl 127 445/tcp open microsoft-ds syn-ack ttl 127 3389/tcp open ms-wbt-server syn-ack ttl 127 |_ssl-ccs-injection: No reply from server (TIMEOUT) |_sslv2-drown: 49152/tcp open unknown syn-ack ttl 127 49153/tcp open unknown syn-ack ttl 127 49154/tcp open unknown syn-ack ttl 127 49158/tcp open unknown syn-ack ttl 127 49159/tcp open unknown syn-ack ttl 127
Host script results: |_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED |_smb-vuln-ms10-054: false |_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED | smb-vuln-ms17-010: | VULNERABLE: | Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010) | State: VULNERABLE | IDs: CVE:CVE-2017-0143 | Risk factor: HIGH | A critical remote code execution vulnerability exists in Microsoft SMBv1 | servers (ms17-010). | | Disclosure date: 2017-03-14 | References: | https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/ | https://technet.microsoft.com/en-us/library/security/ms17-010.aspx |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 05:40 Completed NSE at 05:40, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 05:40 Completed NSE at 05:40, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 147.23 seconds Raw packets sent: 1189 (52.292KB) | Rcvd: 1066 (42.672KB) root@JIYE:~/tryhackme/blue#
|