Sam
https://www.cyberseclabs.co.uk/labs/info/Sam/

Nmap
sudo nmap 172.31.1.18 -p- -f -A
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows Server 2016 Datacenter 14393 microsoft-ds
3389/tcp open ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: SAM
| NetBIOS_Domain_Name: SAM
| NetBIOS_Computer_Name: SAM
| DNS_Domain_Name: SAM
| DNS_Computer_Name: SAM
| Product_Version: 10.0.14393
|_ System_Time: 2020-12-12T15:22:30+00:00
| ssl-cert: Subject: commonName=SAM
| Not valid before: 2020-12-11T09:05:40
|_Not valid after: 2021-06-12T09:05:40
|_ssl-date: 2020-12-12T15:22:36+00:00; -1s from scanner time.
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
49675/tcp open msrpc Microsoft Windows RPC
49676/tcp open msrpc Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
Network Distance: 2 hops
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results:
|_nbstat: NetBIOS name: SAM, NetBIOS user: <unknown>, NetBIOS MAC: 02:db:2b:36:2f:a4 (unknown)
| smb-os-discovery:
| OS: Windows Server 2016 Datacenter 14393 (Windows Server 2016 Datacenter 6.3)
| Computer name: SAM
| NetBIOS computer name: SAM\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2020-12-12T15:22:31+00:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2020-12-12T15:22:31
|_ start_date: 2020-12-12T09:05:41
TRACEROUTE (using port 995/tcp)
HOP RTT ADDRESS
1 30.56 ms 10.10.0.1
2 31.60 ms 172.31.1.18
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 132.68 secondsSMB

SAM


Password Cracking

Initial Foothold

Privilege Escalation










Last updated