The scope of this penetration test is to identify, exploit and report the results of
of penetration test performed on following set of IP addresses.
ID
IPs
Name
DC
Machine 1
10.10.76.112
DC.BABY2.VL
Enumeration
Namp
The initial scan results for machine 1 shows few open port on machine
sudo nmap -sC -sV -oA baby2 10.10.201.37
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-05-08 14:22:57Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP
3268/tcp open ldap Microsoft Windows Active Directory LDAP
3389/tcp open ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2024-05-08T14:24:18+00:00; +6s from scanner time.
| rdp-ntlm-info:
| Target_Name: BABY2
| NetBIOS_Domain_Name: BABY2
| NetBIOS_Computer_Name: DC
| DNS_Domain_Name: baby2.vl
| DNS_Computer_Name: dc.baby2.vl
| DNS_Tree_Name: baby2.vl
| Product_Version: 10.0.20348
|_ System_Time: 2024-05-08T14:23:38+00:00
| ssl-cert: Subject: commonName=dc.baby2.vl
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows