# Nmap 7.92 scan initiated Mon May 8 14:25:59 2023 as: nmap -e tun0 -sC -sV -oA nmap/default -v 10.10.10.125 RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 Nmap scan report for 10.10.10.125 Host is up (0.89s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? 1433/tcp open ms-sql-s Microsoft SQL Server 2017 14.00.1000.00; RTM | ms-sql-ntlm-info: | Target_Name: HTB | NetBIOS_Domain_Name: HTB | NetBIOS_Computer_Name: QUERIER | DNS_Domain_Name: HTB.LOCAL | DNS_Computer_Name: QUERIER.HTB.LOCAL | DNS_Tree_Name: HTB.LOCAL |_ Product_Version: 10.0.17763 |_ssl-date: 2023-05-08T06:27:27+00:00; +2s from scanner time. | ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback | Issuer: commonName=SSL_Self_Signed_Fallback | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha256WithRSAEncryption | Not valid before: 2023-05-08T06:22:51 | Not valid after: 2053-05-08T06:22:51 | MD5: fdf1 4172 6b74 814d beb3 94e4 53b3 9df3 |_SHA-1: 1673 5504 5349 0d0c 5a3c 9aac 81e7 c36b f4fc 8516 Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results: | smb2-time: | date: 2023-05-08T06:27:14 |_ start_date: N/A | smb2-security-mode: | 3.1.1: |_ Message signing enabled but not required | ms-sql-info: | 10.10.10.125:1433: | Version: | name: Microsoft SQL Server 2017 RTM | number: 14.00.1000.00 | Product: Microsoft SQL Server 2017 | Service pack level: RTM | Post-SP patches applied: false |_ TCP port: 1433
Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Mon May 8 14:27:26 2023 -- 1 IP address (1 host up) scanned in 86.80 seconds