LDAP


Nmap discovered a NTP servers on the target UDP ports 123 The running service is ntp

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/access]
└─$ sudo nmap -sU -sC -sV -p123 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-21 14:08 CEST
Nmap scan report for server.access.offsec (192.168.224.187)
Host is up (0.026s latency).
 
PORT    STATE SERVICE VERSION
123/udp open  ntp     NTP v3
| ntp-info: 
|_  
 
Host script results:
|_clock-skew: -12s
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.43 seconds

It uses NTPv3

ntpq


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/access]
└─$ ntpq -c readlist $IP ; ntpq -c readvar $IP ; ntpq -c peers $IP ; ntpq -c associations $IP
***Request timed out
***Request timed out
***Request timed out
***Request timed out