# Nmap 7.93 scan initiated Wed Feb 8 13:29:46 2023 as: nmap -vv --reason -Pn -T4 -sV -sC --version-all -A --osscan-guess -p- -oN /home/kali/htb/flight/results/flight.htb/scans/_full_tcp_nmap.txt -oX /home/kali/htb/flight/results/flight.htb/scans/xml/_full_tcp_nmap.xml flight.htb adjust_timeouts2: packet supposedly had rtt of -198805 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -198805 microseconds. Ignoring time. Nmap scan report for flight.htb (10.10.11.187) Host is up, received user-set (0.029s latency). Scanned at 2023-02-08 13:29:47 CET for 238s Not shown: 65518 filtered tcp ports (no-response) PORT STATE SERVICE REASON VERSION 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2023-02-08 19:31:53Z) 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: flight.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? syn-ack ttl 127 464/tcp open kpasswd5? syn-ack ttl 127 593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped syn-ack ttl 127 3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: flight.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped syn-ack ttl 127 5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing 49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49673/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 49674/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49690/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49699/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host TCP/IP fingerprint: SCAN(V=7.93%E=4%D=2/8%OT=88%CT=%CU=%PV=Y%DS=2%DC=T%G=N%TM=63E396A9%P=x86_64-pc-linux-gnu) SEQ(SP=105%GCD=1%ISR=10A%TS=U) SEQ(SP=105%GCD=1%ISR=10A%II=I%TS=U) OPS(O1=M54BNW8NNS%O2=M54BNW8NNS%O3=M54BNW8%O4=M54BNW8NNS%O5=M54BNW8NNS%O6=M54BNNS) WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70) ECN(R=Y%DF=Y%TG=80%W=FFFF%O=M54BNW8NNS%CC=Y%Q=) T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=) T2(R=N) T3(R=N) T4(R=N) U1(R=N) IE(R=Y%DFI=N%TG=80%CD=Z) Network Distance: 2 hops TCP Sequence Prediction: Difficulty=261 (Good luck!) IP ID Sequence Generation: Busy server or unknown class Service Info: Host: G0; OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: | p2p-conficker: | Checking for Conficker.C or higher... | Check 1 (port 32072/tcp): CLEAN (Timeout) | Check 2 (port 24095/tcp): CLEAN (Timeout) | Check 3 (port 29173/udp): CLEAN (Timeout) | Check 4 (port 44855/udp): CLEAN (Timeout) |_ 0/4 checks are positive: Host is CLEAN or ports are blocked | smb2-security-mode: | 311: |_ Message signing enabled and required | smb2-time: | date: 2023-02-08T19:33:09 |_ start_date: N/A |_clock-skew: 7h00m00s TRACEROUTE (using port 135/tcp) HOP RTT ADDRESS 1 24.75 ms 10.10.16.1 2 24.76 ms flight.htb (10.10.11.187) Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Feb 8 13:33:45 2023 -- 1 IP address (1 host up) scanned in 239.12 seconds