SMB


Nmap discovered a Windows directory server on the target ports 139 and 445

┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ nmap --script smb-enum-shares -sV -p139,445 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-09 16:30 CEST
Nmap scan report for 10.10.150.245
Host is up (0.034s latency).
 
PORT    STATE SERVICE       VERSION
139/tcp open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp open  microsoft-ds?
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.36 seconds
 
 
┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ crackmapexec smb $IP -u ' ' -p ' ' --shares
SMB         10.10.150.245   445    YEAR-OF-THE-OWL  [*] Windows 10 / Server 2019 Build 17763 (name:YEAR-OF-THE-OWL) (domain:year-of-the-owl) (signing:False) (SMBv1:False)
SMB         10.10.150.245   445    YEAR-OF-THE-OWL  [-] year-of-the-owl\ :  STATUS_LOGON_FAILURE 

N/A

Null Session


┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ smbclient -L //$IP/                 
Password for [WORKGROUP\kali]:
session setup failed: NT_STATUS_ACCESS_DENIED

N/A