NTP
Nmap discovered a NTP server on the target UDP port 123
┌──(kali㉿kali)-[~/archive/htb/labs/timelapse]
└─$ sudo nmap -sU -sC -sV -p123 $IP
starting nmap 7.94 ( https://nmap.org ) at 2023-10-24 16:30 CEST
Nmap scan report for dc01 (10.10.11.152)
Host is up (0.17s latency).
PORT STATE SERVICE VERSION
123/udp open ntp NTP v3
| ntp-info:
|_
host script results:
|_clock-skew: 8h00m11s
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 11.79 seconds
┌──(kali㉿kali)-[~/archive/htb/labs/timelapse]
└─$ sudo nmap -sU --script "ntp* and (discovery or vuln) and not (dos or brute)" -p123 $IP
starting nmap 7.94 ( https://nmap.org ) at 2023-10-24 16:31 CEST
Nmap scan report for dc01 (10.10.11.152)
Host is up (0.17s latency).
PORT STATE SERVICE
123/udp open ntp
| ntp-info:
|_ receive time stamp: 2023-10-24T22:31:21
nmap done: 1 IP address (1 host up) scanned in 11.69 seconds
Performing an additional Nmap scan reveals that it uses NTPv3
ntpq
┌──(kali㉿kali)-[~/archive/htb/labs/timelapse]
└─$ ntpq -c readlist $IP ; ntpq -c readvar $IP ; ntpq -c peers $IP ; ntpq -c associations $IP
***Request timed out
***Request timed out
***Request timed out
***Request timed out
Nothing found