Winpcap present, dynamic linked to: WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008) Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-24 10:52 US Mountain Standard Time --------------- Timing report --------------- hostgroups: min 1, max 3 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.3. NSE: Arguments from CLI: smbusername=adminuser,smbdomain=short_domain_name,smbpassword=password,smbbasic=1,smbsign=force NSE: Arguments parsed: smbusername=adminuser,smbdomain=short_domain_name,smbpassword=password,smbbasic=1,smbsign=force NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 10:52 Completed NSE at 10:52, 0.00s elapsed Initiating ARP Ping Scan at 10:52 Scanning TARGET.FQDN.local (10.xx.xxx.xxx) [1 port] Packet capture filter (device eth1): arp and arp[18:4] = 0x005056BE and arp[22:2] = 0x5493 Completed ARP Ping Scan at 10:52, 0.30s elapsed (1 total hosts) Overall sending rates: 3.38 packets / s, 141.89 bytes / s. mass_rdns: Using DNS server 10.xx.xxx.xx mass_rdns: Using DNS server 10.xx.xxx.xx Initiating Parallel DNS resolution of 1 host. at 10:52 mass_rdns: 0.67s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 10:52, 0.02s elapsed DNS resolution of 1 IPs took 0.67s. Mode: Async [#: 2, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 10:52 Scanning TARGETFQDN.local (10.xx.xxx.xxx) [1 port] Packet capture filter (device eth1): dst host 10.xx.xxx.xx and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 10.xx.xxx.xxx))) Discovered open port 445/tcp on 10.xx.xxx.xxx Completed SYN Stealth Scan at 10:52, 0.00s elapsed (1 total ports) Overall sending rates: 0.00 packets / s, 0.00 bytes / s. NSE: Script scanning 10.xx.xxx.xxx. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 10:52 NSE: Starting smb-vuln-ms17-010 against TARGET.FQDN.local (10.xx.xxx.xxx). NSE: [smb-vuln-ms17-010 10.xx.xxx.xxx] SMB: Added account '' to account list NSE: [smb-vuln-ms17-010 10.xx.xxx.xxx] SMB: Added account 'guest' to account list NSE: [smb-vuln-ms17-010 10.xx.xxx.xxx] SMB: Added account 'adminuser' to account list NSE: [smb-vuln-ms17-010 10.xx.xxx.xxx] LM Password: 5025524d454a3f2e454b43354c6yt5439mhd53 NSE: [smb-vuln-ms17-010 10.xx.xxx.xxx] Could not connect to 'IPC$' NSE: Finished smb-vuln-ms17-010 against TARGET.FQDN.local (10.xx.xxx.xxx). Completed NSE at 10:52, 1.01s elapsed Nmap scan report for TARGET.FQDN.local (10.xx.xxx.xxx) Host is up, received arp-response (0.00s latency). Scanned at 2017-05-24 10:52:02 US Mountain Standard Time for 2s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack ttl 128 MAC Address: 00:50:56:BE:48:8C (VMware) Host script results: |_smb-vuln-ms17-010: Could not connect to 'IPC$' Final times for host: srtt: 0 rttvar: 3750 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 10:52 Completed NSE at 10:52, 0.00s elapsed Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 3.67 seconds Raw packets sent: 2 (72B) | Rcvd: 2 (72B)