NTP


Nmap discovered a NTP server on the target UDP port 123

┌──(kali㉿kali)-[~/archive/htb/labs/cerberus]
└─$ sudo nmap -sU -sC -sV -p123 $IP
starting nmap 7.94svn ( https://nmap.org ) at 2024-01-17 08:13 CET
Nmap scan report for 10.10.11.205
Host is up (0.025s latency).
 
PORT    STATE SERVICE VERSION
123/udp open  ntp     NTP v3
| ntp-info: 
|_  
 
host script results:
|_clock-skew: -1s
 
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 10.55 seconds

Performing an additional Nmap scan reveals that it uses NTPv3

ntpq


┌──(kali㉿kali)-[~/archive/htb/labs/cerberus]
└─$ ntpq -c readlist $IP ; ntpq -c readvar $IP ; ntpq -c peers $IP ; ntpq -c associations $IP
***Request timed out
***Request timed out
***Request timed out
***Request timed out

Nothing found