SMB
Nmap discovered a Windows directory server on the target ports 139
and 445
┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ nmap --script smb-enum-shares -sV -p139,445 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-09 16:30 CEST
Nmap scan report for 10.10.150.245
Host is up (0.034s latency).
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.36 seconds
┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ crackmapexec smb $IP -u ' ' -p ' ' --shares
SMB 10.10.150.245 445 YEAR-OF-THE-OWL [*] Windows 10 / Server 2019 Build 17763 (name:YEAR-OF-THE-OWL) (domain:year-of-the-owl) (signing:False) (SMBv1:False)
SMB 10.10.150.245 445 YEAR-OF-THE-OWL [-] year-of-the-owl\ : STATUS_LOGON_FAILURE
N/A
Null Session
┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ smbclient -L //$IP/
Password for [WORKGROUP\kali]:
session setup failed: NT_STATUS_ACCESS_DENIED
N/A