Nmap Scanning

$ nmap -A -T4 -vvv 10.10.101.14

Starting Nmap 7.93 ( <https://nmap.org> ) at 2023-05-21 02:08 EDT
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 02:08
Completed NSE at 02:08, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 02:08
Completed NSE at 02:08, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 02:08
Completed NSE at 02:08, 0.00s elapsed
Initiating Ping Scan at 02:08
Scanning 10.10.101.14 [2 ports]
Completed Ping Scan at 02:08, 1.95s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 02:08
Completed Parallel DNS resolution of 1 host. at 02:08, 0.04s elapsed
DNS resolution of 1 IPs took 0.06s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 02:08
Scanning 10.10.101.14 [1000 ports]
Discovered open port 139/tcp on 10.10.101.14
Discovered open port 3389/tcp on 10.10.101.14
Discovered open port 445/tcp on 10.10.101.14
Discovered open port 135/tcp on 10.10.101.14
Increasing send delay for 10.10.101.14 from 0 to 5 due to 81 out of 201 dropped probes since last increase.
Increasing send delay for 10.10.101.14 from 5 to 10 due to 11 out of 12 dropped probes since last increase.
Discovered open port 49152/tcp on 10.10.101.14
Discovered open port 49158/tcp on 10.10.101.14
Discovered open port 49159/tcp on 10.10.101.14
Discovered open port 49153/tcp on 10.10.101.14
Discovered open port 49154/tcp on 10.10.101.14
Completed Connect Scan at 02:09, 44.66s elapsed (1000 total ports)
Initiating Service scan at 02:09
Scanning 9 services on 10.10.101.14
Service scan Timing: About 44.44% done; ETC: 02:11 (0:01:16 remaining)
Completed Service scan at 02:11, 132.75s elapsed (9 services on 1 host)
NSE: Script scanning 10.10.101.14.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 13.62s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 1.48s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 0.00s elapsed
Nmap scan report for 10.10.101.14
Host is up, received conn-refused (0.42s latency).
Scanned at 2023-05-21 02:08:15 EDT for 192s
Not shown: 988 closed tcp ports (conn-refused)
PORT      STATE    SERVICE            REASON      VERSION
135/tcp   open     msrpc              syn-ack     Microsoft Windows RPC
139/tcp   open     netbios-ssn        syn-ack     Microsoft Windows netbios-ssn
280/tcp   filtered http-mgmt          no-response
445/tcp   open     microsoft-ds       syn-ack     Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp  open     ssl/ms-wbt-server? syn-ack
|_ssl-date: 2023-05-21T06:11:28+00:00; +1s from scanner time.
| ssl-cert: Subject: commonName=Jon-PC
| Issuer: commonName=Jon-PC
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2023-05-20T06:03:11
| Not valid after:  2023-11-19T06:03:11
| MD5:   38f4b98ba9bcc7dc7f1275bf1fe90966
| SHA-1: 340b18eba9a498d4f094062df8749af278f79344
| -----BEGIN CERTIFICATE-----
| MIIC0DCCAbigAwIBAgIQZXPfGCfmW4dGi7CztuvxFTANBgkqhkiG9w0BAQUFADAR
| MQ8wDQYDVQQDEwZKb24tUEMwHhcNMjMwNTIwMDYwMzExWhcNMjMxMTE5MDYwMzEx
| WjARMQ8wDQYDVQQDEwZKb24tUEMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
| AoIBAQDFYkJ1C3qPkP7j8qrxeqHQZVTSeHCSHRKQOPJuWgIlVSnu8M6PU65fOgez
| WjVD+dTJV2zvz02tX5e7pMRETPigDGGzjc/YdMEtzdTbAWlrNMb2Dsv5P7n2Sih2
| Kz9snCM8Qs0ADz7lagmBX2EOvazOpm0+o3lPqE7OHYBzudN8rvFJ05fzVDcVCm1i
| diBL8+aMd7X3cJwTI9QvuLERAFg0qP8z7UbB9k87FxD+gcQ70fA6CVFXF3zdWRwP
| Mk0g3MM73pn52sqvVH9oBWCS3jvpUiFoYv4AK/znJW148Bu2gHIdOelCUQk/A3G9
| viXBtGmAZm/ZBK4Gnxqiu8geynobAgMBAAGjJDAiMBMGA1UdJQQMMAoGCCsGAQUF
| BwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQUFAAOCAQEAsD/8CzdLLR58FNFH
| RlHa2pnrZXZnIXM4ff7+DsvUOiahKcN8uSDXGt7dfbqa85km1VBjnHkx6D0wL+oz
| M8QlXzwqlPRVcJ5eRHd7dZ4/E2MtUEsBj7ekB9TrVDBQPjrh5848Kb2eEuI5eKJx
| S+dJoazgl1E89jiRqx+BHE1EReQlu8ehBQlJZw4u16Vdz8vVPCwiaV/bXIK9JZco
| NM7HyoC2SLY5uAt4ba8mFdThA8NEBmsg+FGU4mjz88JPWFKchQPwQ56cLtO23v0w
| Fq8HMRh5TGbbSWe71oWJl2I+Y8D5HDYd0+runaEV53QMhcc0DdoeBe2Ea3iIcNnl
| xwj85A==
|_-----END CERTIFICATE-----
| rdp-ntlm-info: 
|   Target_Name: JON-PC
|   NetBIOS_Domain_Name: JON-PC
|   NetBIOS_Computer_Name: JON-PC
|   DNS_Domain_Name: Jon-PC
|   DNS_Computer_Name: Jon-PC
|   Product_Version: 6.1.7601
|_  System_Time: 2023-05-21T06:11:16+00:00
3826/tcp  filtered wormux             no-response
19350/tcp filtered unknown            no-response
49152/tcp open     msrpc              syn-ack     Microsoft Windows RPC
49153/tcp open     msrpc              syn-ack     Microsoft Windows RPC
49154/tcp open     msrpc              syn-ack     Microsoft Windows RPC
49158/tcp open     msrpc              syn-ack     Microsoft Windows RPC
49159/tcp open     msrpc              syn-ack     Microsoft Windows RPC
Service Info: Host: JON-PC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2023-05-21T06:11:15
|_  start_date: 2023-05-21T06:03:09
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 1h00m01s, deviation: 2h14m10s, median: 0s
| nbstat: NetBIOS name: JON-PC, NetBIOS user: <unknown>, NetBIOS MAC: 021a7b7d5371 (unknown)
| Names:
|   JON-PC<00>           Flags: <unique><active>
|   WORKGROUP<00>        Flags: <group><active>
|   JON-PC<20>           Flags: <unique><active>
|   WORKGROUP<1e>        Flags: <group><active>
|   WORKGROUP<1d>        Flags: <unique><active>
|   \\x01\\x02__MSBROWSE__\\x02<01>  Flags: <group><active>
| Statistics:
|   021a7b7d53710000000000000000000000
|   0000000000000000000000000000000000
|_  0000000000000000000000000000
| smb-os-discovery: 
|   OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
|   Computer name: Jon-PC
|   NetBIOS computer name: JON-PC\\x00
|   Workgroup: WORKGROUP\\x00
|_  System time: 2023-05-21T01:11:15-05:00
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 30358/tcp): CLEAN (Couldn't connect)
|   Check 2 (port 11124/tcp): CLEAN (Couldn't connect)
|   Check 3 (port 20306/udp): CLEAN (Failed to receive data)
|   Check 4 (port 63881/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode: 
|   210: 
|_    Message signing enabled but not required

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 02:11
Completed NSE at 02:11, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
Nmap done: 1 IP address (1 host up) scanned in 195.01 seconds

vulnerable.png

meta.png

use.png

Exploitation

exploitation.png

meterpreter.png

guid.png

hashdump.png

$ sudo john --format=nt hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt

flag1.png