NTP
Nmap discovered a NTP service on the target UDP port 123
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ sudo nmap -sU -sV -sC -p123 $IP
[sudo] password for kali:
starting nmap 7.93 ( https://nmap.org ) at 2023-07-17 14:14 CEST
Nmap scan report for htb.corp (10.10.11.222)
Host is up (0.097s latency).
PORT STATE SERVICE VERSION
123/udp open ntp NTP v3
| ntp-info:
|_
host script results:
|_clock-skew: 10s
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 10.87 seconds
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ sudo nmap -sU --script "ntp* and (discovery or vuln) and not (dos or brute)" -p123 $IP
starting nmap 7.93 ( https://nmap.org ) at 2023-07-17 14:20 CEST
Nmap scan report for htb.corp (10.10.11.222)
Host is up (0.087s latency).
PORT STATE SERVICE
123/udp open ntp
| ntp-info:
|_ receive time stamp: 2023-07-17T12:20:40
nmap done: 1 IP address (1 host up) scanned in 10.72 seconds
Additional Nmap scans revealed that it’s running NTP v3
It also shows the target system’s time
ntpq
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ ntpq -c readlist $IP
***Request timed out
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ ntpq -c readvar $IP
***Request timed out
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ ntpq -c peers
***Socket error; probably ntpd is not running
┌──(kali㉿kali)-[~/archive/htb/labs/authority]
└─$ ntpq -c associations $IP
***Request timed out
Nothing found