Analysis
Description
Automated Scanning
NMap Scan
# Nmap 7.94SVN scan initiated Fri Mar 1 14:27:22 2024 as: nmap -sC -sV -vvv -T4 -oN Data/Machines/analysis/nmap.txt 10.10.11.250
Increasing send delay for 10.10.11.250 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
Nmap scan report for analysis.htb (10.10.11.250)
Host is up, received syn-ack (0.086s latency).
Scanned at 2024-03-01 14:27:23 EST for 56s
Not shown: 987 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
53/tcp open domain syn-ack Simple DNS Plus
80/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Site doesn't have a title (text/html).
| http-server-header:
| Microsoft-HTTPAPI/2.0
|_ Microsoft-IIS/10.0
|_http-favicon: Unknown favicon MD5: 357C439FB7A4491072C7EB34E33F3990
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2024-03-01 19:27:50Z)
135/tcp open msrpc syn-ack Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: analysis.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds? syn-ack
464/tcp open kpasswd5? syn-ack
593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped syn-ack
3268/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: analysis.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped syn-ack
3306/tcp open mysql syn-ack MySQL (unauthorized)
Service Info: Host: DC-ANALYSIS; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
| smb2-time:
| date: 2024-03-01T19:27:58
|_ start_date: N/A
|_clock-skew: 0s
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 7365/tcp): CLEAN (Couldn't connect)
| Check 2 (port 24886/tcp): CLEAN (Couldn't connect)
| Check 3 (port 9653/udp): CLEAN (Timeout)
| Check 4 (port 41050/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Mar 1 14:28:19 2024 -- 1 IP address (1 host up) scanned in 57.44 seconds
Gobuster (DNS) Scan
DirBuster Scan
No Results
Nuclei Scan
[caa-fingerprint] [dns] [info] analysis.htb
[options-method] [http] [info] http://analysis.htb ["OPTIONS, TRACE, GET, HEAD, POST"]
[email-extractor] [http] [info] http://analysis.htb ["mail@demolink.org","privacy@demolink.org"]
[microsoft-iis-version] [http] [info] http://analysis.htb ["Microsoft-IIS/10.0"]
[tech-detect:google-font-api] [http] [info] http://analysis.htb
[tech-detect:ms-iis] [http] [info] http://analysis.htb
[old-copyright] [http] [info] http://analysis.htb ["\u00a9 2023"]
[http-missing-security-headers:content-security-policy] [http] [info] http://analysis.htb
[http-missing-security-headers:x-content-type-options] [http] [info] http://analysis.htb
[http-missing-security-headers:referrer-policy] [http] [info] http://analysis.htb
[http-missing-security-headers:clear-site-data] [http] [info] http://analysis.htb
[http-missing-security-headers:cross-origin-opener-policy] [http] [info] http://analysis.htb
[http-missing-security-headers:cross-origin-resource-policy] [http] [info] http://analysis.htb
[http-missing-security-headers:strict-transport-security] [http] [info] http://analysis.htb
[http-missing-security-headers:permissions-policy] [http] [info] http://analysis.htb
[http-missing-security-headers:x-frame-options] [http] [info] http://analysis.htb
[http-missing-security-headers:x-permitted-cross-domain-policies] [http] [info] http://analysis.htb
[http-missing-security-headers:cross-origin-embedder-policy] [http] [info] http://analysis.htb
[mixed-passive-content:img] [http] [info] http://analysis.htb ["http://storage.ie6countdown.com/assets/100/images/banners/warning_bar_0000_us.jpg"]
[iis-shortname] [http] [info] http://analysis.htb/*~1*/a.aspx'
[smb-enum] [javascript] [info] analysis.htb:445 ["OSVersion: 10.0.17763","NetBIOSComputerName: DC-ANALYSIS","NetBIOSDomainName: ANALYSIS","DNSComputerNamen: DC-ANALYSIS.analysis.htb","DNSComputerName: DC-ANALYSIS.analysis.htb","ForestName: analysis.htb"]
[smb2-capabilities] [javascript] [info] analysis.htb:445 ["[\"DFSSupport\",\"LargeMTU\",\"Leasing\"]"]
Automation Summary
NMap Scan Summary:
- Host is running a variety of services on TCP ports including DNS, HTTP, Kerberos, Microsoft RPC, NetBIOS, LDAP, MySQL, and others.
- Microsoft HTTPAPI httpd 2.0 and Microsoft-IIS/10.0 are identified as HTTP services.
- Active Directory LDAP services are running, indicating a Windows domain environment.
- Kerberos authentication is active.
- MySQL service is unauthorized.
- Some SMB security configurations are in place including message signing.
Nuclei Scan Summary:
- Detected various HTTP headers missing, indicating potential security misconfigurations.
- Identified Microsoft IIS version 10.0.
- Found outdated copyright information.
- Detected mixed passive content for images.
- Discovered SMB enumeration details including OS version, NetBIOS details, and capabilities.
Insights:
- The machine appears to be a Windows-based server running Active Directory services.
- Several potential security misconfigurations are present on the web server, which could be exploited for further enumeration or attacks.
- SMB enumeration details provide insights into the server's network and domain configuration, useful for further enumeration and exploitation.
These scans provide valuable information for further penetration testing and exploitation of the target machine.
AI Generated
User Own
Root Own
Summary
AI Generated