┌──(root㉿hack)-[/home/hack/Desktop] └─# nmap -sT -sC -p- --min-rate="1000" 192.168.56.128 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-2323:08 CST Nmap scan report for192.168.56.128 Host is up (0.00041s latency). Not shown:65517 filtered tcp ports (no-response) PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 5985/tcp open wsman 9389/tcp open adws 49664/tcp open unknown 49668/tcp open unknown 49676/tcp open unknown 49689/tcp open unknown 49709/tcp open unknown MAC Address:08:00:27:83:7B:79(Oracle VirtualBox virtual NIC) Host script results: | smb2-time: | date:2024-07-24T06:10:06 |_ start_date: N/A |_nbstat: NetBIOS name: DC01, NetBIOS user:<unknown>, NetBIOS MAC:08:00:27:83:7b:79(Oracle VirtualBox virtual NIC) | smb2-security-mode: |3:1:1: |_ Message signing enabled and required |_clock-skew: 14h59m15s Nmap done:1 IP address (1 host up) scanned in199.85 seconds