Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-23 11:17 EDTNmap scan report for 10.10.84.223Host is up (0.23s latency).Not shown: 65527 filtered tcp ports (no-response)PORT STATE SERVICE VERSION80/tcp open http Microsoft IIS httpd 10.0135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds3389/tcp open ms-wbt-server Microsoft Terminal Services49663/tcp open http Microsoft IIS httpd 10.049666/tcp open msrpc Microsoft Windows RPC49668/tcp open msrpc Microsoft Windows RPCWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portDevice type: general purposeRunning (JUST GUESSING): Microsoft Windows 2012|2016|2008|7 (91%)OS CPE: cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_7Aggressive OS guesses: Microsoft Windows Server 2012 R2 (91%), Microsoft Windows Server 2016 (91%), Microsoft Windows 7 or Windows Server 2008 R2 (85%)No exact OS matches for host (test conditions non-ideal).Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windowsOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 1388.04 seconds
nmap -p- -A -T4 --script vuln 10.10.84.223 -oN Ascan.txt:
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-23 11:15 EDTNmap scan report for 10.10.84.223Host is up (0.20s latency).Not shown: 65527 filtered tcp ports (no-response)PORT STATE SERVICE VERSION80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-dombased-xss: Couldn't find any DOM based XSS.|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.| http-slowloris-check:| VULNERABLE:| Slowloris DOS attack| State: LIKELY VULNERABLE| IDs: CVE:CVE-2007-6750| Slowloris tries to keep many connections to the target web server open and hold| them open as long as possible. It accomplishes this by opening connections to| the target web server and sending a partial request. By doing so, it starves| the http server's resources causing Denial Of Service.| | Disclosure date: 2009-09-17| References:| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750|_ http://ha.ckers.org/slowloris/|_http-server-header: Microsoft-IIS/10.0|_http-csrf: Couldn't find any CSRF vulnerabilities.135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds3389/tcp open ms-wbt-server?49663/tcp open unknown49666/tcp open msrpc Microsoft Windows RPC49668/tcp open unknownWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portDevice type: general purposeRunning (JUST GUESSING): Microsoft Windows 2012|2016|2008|7 (91%)OS CPE: cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_7Aggressive OS guesses: Microsoft Windows Server 2012 R2 (91%), Microsoft Windows Server 2016 (91%), Microsoft Windows 7 or Windows Server 2008 R2 (85%)No exact OS matches for host (test conditions non-ideal).Network Distance: 2 hopsService Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windowsHost script results:| smb-vuln-ms17-010:| VULNERABLE:| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)| State: VULNERABLE| IDs: CVE:CVE-2017-0143| Risk factor: HIGH| A critical remote code execution vulnerability exists in Microsoft SMBv1| servers (ms17-010).|| Disclosure date: 2017-03-14| References:| https://technet.microsoft.com/en-us/library/security/ms17-010.aspx| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143|_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/|_smb-vuln-ms10-054: false|_smb-vuln-ms10-061: ERROR: Script execution failed (use -d to debug)TRACEROUTE (using port 3389/tcp)HOP RTT ADDRESS1 186.99 ms 10.21.0.12 191.37 ms 10.10.84.223OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 2200.95 seconds
http enum:
two ports hosting an http site:
80/tcp open http Microsoft IIS httpd 10.0
49663/tcp open http Microsoft IIS httpd 10.0
nothing. just the default IIS pages. directory busting gave nothing