LDAP
Nmap discovered a NTP servers on the target UDP ports 123
The running service is ntp
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/access]
└─$ sudo nmap -sU -sC -sV -p123 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-21 14:08 CEST
Nmap scan report for server.access.offsec (192.168.224.187)
Host is up (0.026s latency).
PORT STATE SERVICE VERSION
123/udp open ntp NTP v3
| ntp-info:
|_
Host script results:
|_clock-skew: -12s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.43 seconds
It uses NTPv3
ntpq
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/access]
└─$ ntpq -c readlist $IP ; ntpq -c readvar $IP ; ntpq -c peers $IP ; ntpq -c associations $IP
***Request timed out
***Request timed out
***Request timed out
***Request timed out