Legacy
Executive Summary
Machine Information
Reconnaissance
Port Scanning
nmap -sCV -oA nmap/initial 10.129.3.61
Host: 10.129.3.61 () Ports:
135/open/tcp//msrpc//Microsoft Windows RPC/
139/open/tcp//netbios-ssn//Microsoft Windows netbios-ssn/
445/open/tcp//microsoft-ds//Windows XP microsoft-ds/
Host script results:
| smb-os-discovery:
| OS: Windows XP (Windows 2000 LAN Manager)
| OS CPE: cpe:/o:microsoft:windows_xp::-
| Computer name: legacy
| NetBIOS computer name: LEGACY\\x00
| Workgroup: HTB\\x00
|_ System time: 2026-01-10T10:06:46+02:00
|_smb2-time: Protocol negotiation failed (SMB2)
|_smb2-security-mode: Couldn't establish a SMBv2 connection.
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 44351/tcp): CLEAN (Couldn't connect)
| Check 2 (port 62500/tcp): CLEAN (Couldn't connect)
| Check 3 (port 29483/udp): CLEAN (Failed to receive data)
| Check 4 (port 35958/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| nbstat: NetBIOS name: nil, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:b9:ed:3b (VMware)
| Names:
|
| Statistics:
| 00:50:56:b9:ed:3b:00:00:00:00:00:00:00:00:00:00:00
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_ 00:00:00:00:00:00:00:00:00:00:00:00:00:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 5d00h57m51s, deviation: 1h24m51s, median: 4d23h57m51s
Open Ports
Service Enumeration
Initial Access
Vulnerability Identified
Exploitation Steps
Proof of Concept
User Flag
Root Flag
Key Learnings
Technical Skills
References
Last updated