Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
77 views1 page

Nmap

The Nmap scan on IP address 192.168.165.97 reveals that the host is up with several open ports, including DNS, Kerberos, and Microsoft RPC services. The host is identified as a Windows Server 2016 Standard with the domain 'secura.yzx' and the computer name 'DC01'. Additionally, the scan indicates that message signing is enabled and required for SMB connections.

Uploaded by

sshangxuangpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views1 page

Nmap

The Nmap scan on IP address 192.168.165.97 reveals that the host is up with several open ports, including DNS, Kerberos, and Microsoft RPC services. The host is identified as a Windows Server 2016 Standard with the domain 'secura.yzx' and the computer name 'DC01'. Additionally, the scan indicates that message signing is enabled and required for SMB connections.

Uploaded by

sshangxuangpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

# Nmap 7.

95 scan initiated Sun Jul 13 08:54:28 2025 as: /usr/lib/nmap/nmap -sC -sV
-oN vm1_97/nmap.txt 192.168.165.97
Nmap scan report for 192.168.165.97
Host is up (0.011s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-07-13
12:54:38Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain:
secura.yzx, Site: Default-First-Site-Name)
445/tcp open microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds
(workgroup: SECURA)
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain:
secura.yzx, Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:


| smb2-time:
| date: 2025-07-13T12:54:41
|_ start_date: 2025-02-20T19:57:55
|_clock-skew: mean: 0s, deviation: 2s, median: -1s
| smb-os-discovery:
| OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3)
| Computer name: dc01
| NetBIOS computer name: DC01\x00
| Domain name: secura.yzx
| Forest name: secura.yzx
| FQDN: dc01.secura.yzx
|_ System time: 2025-07-13T12:54:42+00:00
| smb-security-mode:
| account_used: <blank>
| authentication_level: user
| challenge_response: supported
|_ message_signing: required
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required

Service detection performed. Please report any incorrect results at


https://nmap.org/submit/ .
# Nmap done at Sun Jul 13 08:55:20 2025 -- 1 IP address (1 host up) scanned in
51.93 seconds

You might also like