[Challenge 1:] Network Scanning & Service Enumeration


All of the scanning results appear in the rest of the challenges

Routing IP Addresses

Operating Systems and Hostnames

IP Addresses Operating System Hostnames
172.17.0.2 Windows FNB.com
172.17.0.3 Linux CentOS 6.4
10.10.0.2 Windows Server 2008 R2 ENTERTAINMENT
10.10.0.3 Windows Server 2008 R2 ECOMM
172.19.19.2 Windows 7 Ultimate ACCOUNTS
172.19.19.3 Windows Server 2008 LDAP AD
172.19.19.4 Windows
172.19.19.5 Linux Ubuntu
172.19.19.6 Windows Server 2012 HRDEPT
172.19.19.7 Windows Vista
172.19.19.8 Windows XP OPERATIONS
172.19.19.9 Windows 8

PORTS OPEN

IP ADDRESS Ports (TCP and UDP)
172.17.0.2 21, 80, 135, 139, 445, 3389, 49152, 49153, 49154, 49155, 49156, 49157, 137, 138, 192, 500, 1054, 1081, 1087, 4500, 5001, 5355, 7938, 16938, 17494, 28465, 29810, 44334, 45818, 48255
172.17.0.3 21, 22 , 23 , 23 , 1041, 1051 , 16086, 26872, 32815, 35777, 36206, 48761, 49163, 49192, 53006, 54711
10.10.0.2 21, 80, 135, 139, 445, 3389, 49152, 49153, 49154, 49155, 49156, 49157, 137, 138, 500, 1484, 2160, 2223, 4500, 5000, 5355, 6000, 17321, 19120, 19687, 20423, 21318, 21674, 22124, 38293
10.10.0.3 21, 80, 135, 139, 389, 445, 3306, 3389, 49152, 49153, 49154, 49155, 49156, 49157, 137, 138, 500, 689, 1024, 1346, 4500, 5355, 6970 11487, 16548, 17487, 17615, 18958, 32777, 49360
172.19.19.2 21, 80, 135, 445, 3389, 49152, 49153, 49154, 49155, 49156, 49157, 123, 137, 161, 500, 520, 1900, 2222, 4500, 5093, 5355, 6970, 17762, 17939, 21868, 22692, 26415, 39714, 39714, 41896, 49156
172.19.19.3 21, 53, 80, 88, 135, 139, 389, 445, 464, 593, 636, 3268, 3269, 3389, 5357, 49152, 49153, 49154, 49155, 49156, 49157, 53, 88, 123, 137, 138, 161, 389, 464, 500, 502, 3702, 4500, 5355, 6971, 16503, 17638, 17814, 19140, 31059, 36384, 36458, 44334, 47808, 54114
172.19.19.5 21, 80, 5353
172.19.19.6 21, 80, 135, 139, 445, 3306, 49152, 49153, 49154, 49155, 49157, 128, 137, 138, 161, 500, 626, 1027, 1200, 4500, 5355, 6346, 17673, 20465, 34855, 47765, 49178, 49200, 54114
172.19.19.8 21, 135, 139, 445, 3389, 123, 137, 138, 500, 1025, 1026, 4500
172.19.19.9 21, 80, 135, 139, 445, 3306, 3389, 49152, 49153, 49154, 49155, 49156, 49157, 49158, 123, 137, 161, 500, 772, 1039, 1900, 3389, 4500, 5355, 17146, 18449, 20449, 25931, 32775, 45247, 49176, 49180, 53571

Services Running

IP Address Services Running
172.17.0.2 ftp, http, msrpc, netbio-ssn, microsoft-ds, ms-wbt-server, netbio-ns, netbios-dgm, osu-nms, isakmp, brvread, pvuniwien, cplscramber-in, nat-t-ike, complex-link, llmnr
172.17.0.3 ftp, ssh, telnet, telnet, danf-ak2, optima-vnet
10.10.0.2 ftp, http, msrpc, netbios-ssn, microsoft-ds, ms-wbt-sever, netbios-ns, netbios-dgm, isakmp, confluent, apc-2160, rockwell-csp2, nat-t-ike, upnp, llmnr, X11, landesk-cba
10.10.0.3 ftp, http, msrpc, netbios-ds, mysql, ms-wbt-server, netbios-ns, netbios-dgm, isakmp, nmap, alta-ana-lm, nat-t-ike, llmnr, sometimes-rpc18
172.19.19.2 ftp, http, msrpc, netbio-snn, microsoft-ds, ms-wbt-server, ntp, netbio-ns, netbio-dgm, snmp, isakmp, route, upnp, msantipiracy, nat-t-ike, sentinel-lm, llmnr
127.19.19.3 ftp, domain, http, kerberos-sec, msrpc, netbios-ssn, ldap, microsoft-ds, kpasswd5, http-rpc-epmap, ldapssl, globalcatLDAP, globalcatLDAPssl, wsdapi, domain, ntp, netbio-ns, netbios-dgm, snmp, ldap, kpasswd5, isakmp, mbap, ws-discovery, nat-t-ike, llmnr, bacnet
172.19.19.5 ftp, http, zeroconf
172.19.19.6 ftp, http, msrpc, netbio-ssn, microsoft-ds, mysql, ntp, netbio-ns, netbios-dgm, snmp, isakmp, serialnumbered, pkix-3-ca-ra, scol, nat-t-ike, llmnr, gnutella
172.19.19.8 tcpwrapped, msrpc, netbio-ssn, microsofy-ds, microsoft terminal service, ntp, netbio-dgm, microsoft-ds, isakmp, blackjack, win-rpc, nat-t-ike
172.19.19.9 ftp, http, msrpc, netbios-ssn, microsoft-ds, mysql, ms-wbt-server, ntp, netbios-ns, netbios-dgm, snmp, isakmp, cycleserv2, sbl, upnp, ms-wbt-server, nat-t-ike, llmnr, sometimes-rpc14

After discovering live systems, we started port scanning to detect the open ports and identify the services running on these hosts. Port scanning is the process of checking the services running on the target computer by sending a sequence of messages in an attempt to break in. Port scanning involves connecting to or probing TCP and UDP ports on the target system to determine if the services are running or are in a listening state. The listening state gives an idea of the operating system and the application in use. Sometimes, active services that are listening may allow unauthorized user access to systems that are misconfigured or running software that has vulnerabilities.

results matching ""

    No results matching ""