PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
3389/tcp open ms-wbt-server?
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
nmap --script=smb-security-mode -p445
172.16.0.1Starting Nmap 6.00 (
http://nmap.org ) at 2018-09-13 12:32 MSK
Nmap scan report for
172.16.0.1Host is up (0.0012s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results:
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
nmap --script=smb-os-discovery -p445
172.16.0.1Starting Nmap 6.00 (
http://nmap.org ) at 2018-09-13 12:33 MSK
Nmap scan report for
172.16.0.1Host is up (0.0011s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results:
| smb-os-discovery:
| OS: Windows 10 Pro 14393 (Windows 10 Pro 6.3)
| NetBIOS computer name: DESKTOP-K7F038F
| Workgroup: WORKGROUP
|_ System time: 2018-09-13 12:33:41 UTC+3
Host script results:
| smb-brute:
| administrator:<blank> => Valid credentials, account disabled
|_ guest:<blank> => Valid credentials, account disabled