Winpcap present, dynamic linked to: Npcap version 0.78 r5, based on libpcap version 1.8.1 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-21 08:55 US Mountain Standard Time --------------- Timing report --------------- hostgroups: min 1, max 3 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.3. NSE: Arguments from CLI: NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 08:55 Completed NSE at 08:55, 0.00s elapsed Initiating ARP Ping Scan at 08:55 Scanning WIN-RDHFOA4C1MD (192.168.19.132) [1 port] Packet capture filter (device eth2): arp and arp[18:4] = 0x005056C0 and arp[22:2] = 0x0001 Completed ARP Ping Scan at 08:55, 0.47s elapsed (1 total hosts) Overall sending rates: 2.12 packets / s, 89.17 bytes / s. mass_rdns: Using DNS server 192.168.1.1 Initiating Parallel DNS resolution of 1 host. at 08:55 mass_rdns: 1.60s 0/1 [#: 1, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 08:55, 0.16s elapsed DNS resolution of 1 IPs took 1.60s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 08:55 Scanning WIN-RDHFOA4C1MD (192.168.19.132) [1 port] Packet capture filter (device eth2): dst host 192.168.19.1 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.168.19.132))) Discovered open port 445/tcp on 192.168.19.132 Completed SYN Stealth Scan at 08:55, 0.00s elapsed (1 total ports) Overall sending rates: 1000.00 packets / s, 44000.00 bytes / s. NSE: Script scanning 192.168.19.132. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 08:55 NSE: Starting smb-vuln-ms17-010 against WIN-RDHFOA4C1MD (192.168.19.132). NSE: [smb-vuln-ms17-010 192.168.19.132] SMB: Added account '' to account list NSE: [smb-vuln-ms17-010 192.168.19.132] SMB: Added account 'guest' to account list NSE: [smb-vuln-ms17-010 192.168.19.132] LM Password: NSE: [smb-vuln-ms17-010 192.168.19.132] SMB: Extended login to 192.168.19.132 as WIN-RDHFOA4C1MD\guest failed (NT_STATUS_ACCOUNT_DISABLED) NSE: [smb-vuln-ms17-010 192.168.19.132] LM Password: NSE: [smb-vuln-ms17-010 192.168.19.132] SMB: Extended login to 192.168.19.132 as WIN-RDHFOA4C1MD\ failed (NT_STATUS_ACCESS_DENIED) NSE: [smb-vuln-ms17-010 192.168.19.132] Could not connect to 'IPC$' NSE: Finished smb-vuln-ms17-010 against WIN-RDHFOA4C1MD (192.168.19.132). Completed NSE at 08:55, 0.03s elapsed Nmap scan report for WIN-RDHFOA4C1MD (192.168.19.132) Host is up, received arp-response (0.00s latency). Scanned at 2017-05-21 08:55:53 US Mountain Standard Time for 2s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack ttl 128 MAC Address: 00:0C:29:CA:AC:88 (VMware) Host script results: |_smb-vuln-ms17-010: Could not connect to 'IPC$' Final times for host: srtt: 0 rttvar: 3750 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 08:55 Completed NSE at 08:55, 0.00s elapsed Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 3.94 seconds Raw packets sent: 2 (72B) | Rcvd: 2 (72B)