NTP


Nmap discovered a NTP server on the target UDP port 123

┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ sudo nmap -sU -sV -sC -p123 $IP
[sudo] password for kali: 
starting nmap 7.94 ( https://nmap.org ) at 2023-09-10 19:16 CEST
Nmap scan report for rebound.htb (10.10.11.231)
Host is up (0.026s latency).
 
PORT    STATE SERVICE VERSION
123/udp open  ntp     NTP v3
| ntp-info: 
|_  
 
host script results:
|_clock-skew: 7h00m01s
 
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 10.45 seconds
 
┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ sudo nmap -sU --script "ntp* and (discovery or vuln) and not (dos or brute)" -p123 $IP
[sudo] password for kali: 
starting nmap 7.94 ( https://nmap.org ) at 2023-09-11 02:17 CEST
Nmap scan report for rebound.htb (10.10.11.231)
Host is up (0.026s latency).
 
PORT    STATE SERVICE
123/udp open  ntp
| ntp-info: 
|_  receive time stamp: 2023-09-11T00:17:40
 
nmap done: 1 IP address (1 host up) scanned in 10.46 seconds

Additional Nmap scans revealed that it’s running NTP v3

ntpq


┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ ntpq -c readlist $IP
***Request timed out
 
┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ ntpq -c readvar $IP
***Request timed out
 
┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ ntpq -c peers $IP
***Request timed out
 
┌──(kali㉿kali)-[~/archive/htb/labs/rebound]
└─$ ntpq -c associations $IP
***Request timed out

Nothing found