Starting Nmap 7.80 ( https://nmap.org ) at 2022-02-10 15:21 CET NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 15:21 Completed NSE at 15:21, 0.00s elapsed Initiating NSE at 15:21 Completed NSE at 15:21, 0.00s elapsed Initiating NSE at 15:21 Completed NSE at 15:21, 0.00s elapsed Initiating ARP Ping Scan at 15:21 Scanning 192.168.0.36 [1 port] Completed ARP Ping Scan at 15:21, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 15:21 Completed Parallel DNS resolution of 1 host. at 15:21, 0.00s elapsed Initiating SYN Stealth Scan at 15:21 Scanning 192.168.0.36 [1000 ports] Discovered open port 445/tcp on 192.168.0.36 Discovered open port 139/tcp on 192.168.0.36 Discovered open port 135/tcp on 192.168.0.36 Discovered open port 53/tcp on 192.168.0.36 Discovered open port 3268/tcp on 192.168.0.36 Discovered open port 389/tcp on 192.168.0.36 Discovered open port 3269/tcp on 192.168.0.36 Discovered open port 593/tcp on 192.168.0.36 Discovered open port 88/tcp on 192.168.0.36 Discovered open port 464/tcp on 192.168.0.36 Discovered open port 636/tcp on 192.168.0.36 Completed SYN Stealth Scan at 15:21, 4.83s elapsed (1000 total ports) Initiating Service scan at 15:21 Scanning 11 services on 192.168.0.36 Completed Service scan at 15:23, 141.12s elapsed (11 services on 1 host) Initiating OS detection (try #1) against 192.168.0.36 NSE: Script scanning 192.168.0.36. Initiating NSE at 15:23 Completed NSE at 15:24, 40.09s elapsed Initiating NSE at 15:24 Completed NSE at 15:24, 17.01s elapsed Initiating NSE at 15:24 Completed NSE at 15:24, 0.00s elapsed Nmap scan report for 192.168.0.36 Host is up (0.00048s latency). Not shown: 989 filtered ports PORT STATE SERVICE VERSION 53/tcp open domain? | fingerprint-strings: | DNSVersionBindReqTCP: | version |_ bind 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-02-10 14:21:28Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onf41.lan, Site: Default-First-Site-Name) 445/tcp open microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: onf41) 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: onf41.lan, Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port53-TCP:V=7.80%I=7%D=2/10%Time=62051F6F%P=x86_64-pc-linux-gnu%r(DNSV SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\ SF:x04bind\0\0\x10\0\x03"); MAC Address: 08:00:27:3A:E3:56 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Microsoft Windows 2016 OS CPE: cpe:/o:microsoft:windows_server_2016 OS details: Microsoft Windows Server 2016 Uptime guess: 0.032 days (since Thu Feb 10 14:38:47 2022) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=263 (Good luck!) IP ID Sequence Generation: Incremental Service Info: Host: ONFDC; OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: mean: -20m02s, deviation: 34m38s, median: -2s | nbstat: NetBIOS name: ONFDC, NetBIOS user: , NetBIOS MAC: 08:00:27:3a:e3:56 (Oracle VirtualBox virtual NIC) | Names: | ONFDC<00> Flags: | ONF41<1c> Flags: | ONF41<00> Flags: | ONFDC<20> Flags: |_ ONF41<1b> Flags: | smb-os-discovery: | OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3) | Computer name: onfdc | NetBIOS computer name: ONFDC\x00 | Domain name: onf41.lan | Forest name: onf41.lan | FQDN: onfdc.onf41.lan |_ System time: 2022-02-10T15:23:45+01:00 | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: required | smb2-security-mode: | 2.02: |_ Message signing enabled and required | smb2-time: | date: 2022-02-10T14:23:45 |_ start_date: 2022-02-10T13:39:07 TRACEROUTE HOP RTT ADDRESS 1 0.48 ms 192.168.0.36 NSE: Script Post-scanning. Initiating NSE at 15:24 Completed NSE at 15:24, 0.00s elapsed Initiating NSE at 15:24 Completed NSE at 15:24, 0.00s elapsed Initiating NSE at 15:24 Completed NSE at 15:24, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 205.32 seconds Raw packets sent: 2027 (91.026KB) | Rcvd: 22 (1.298KB)