
Week 8. Hospital
TL;DR
KEYWORDS
REFERENCE
ENUMERATION
> nmap $target -p- -T4 -Pn --open --reason
Starting Nmap 7.93 ( https://nmap.org ) at 2023-11-18 15:35 EST
Nmap scan report for 10.129.70.232
Host is up, received user-set (0.041s latency).
Not shown: 65506 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack
53/tcp open domain syn-ack
88/tcp open kerberos-sec syn-ack
135/tcp open msrpc syn-ack
139/tcp open netbios-ssn syn-ack
389/tcp open ldap syn-ack
443/tcp open https syn-ack
445/tcp open microsoft-ds syn-ack
464/tcp open kpasswd5 syn-ack
593/tcp open http-rpc-epmap syn-ack
636/tcp open ldapssl syn-ack
1801/tcp open msmq syn-ack
2103/tcp open zephyr-clt syn-ack
2105/tcp open eklogin syn-ack
2107/tcp open msmq-mgmt syn-ack
2179/tcp open vmrdp syn-ack
3268/tcp open globalcatLDAP syn-ack
3269/tcp open globalcatLDAPssl syn-ack
3389/tcp open ms-wbt-server syn-ack
5985/tcp open wsman syn-ack
6404/tcp open boe-filesvr syn-ack
6406/tcp open boe-processsvr syn-ack
6407/tcp open boe-resssvr1 syn-ack
6409/tcp open boe-resssvr3 syn-ack
6614/tcp open unknown syn-ack
6635/tcp open mpls-udp syn-ack
7326/tcp open icb syn-ack
8080/tcp open http-proxy syn-ack
9389/tcp open adws syn-ack
Nmap done: 1 IP address (1 host up) scanned in 95.25 secondsUSER
SYSTEM
Last updated