You Got Mail TryHackme Posted on March 17, 2025March 17, 2025 by Bipzilla Nmap result nmap -T4 -sV -p- -sC 10.10.143.3 Starting Nmap 7.93 ( https://nmap.org ) at 2025-03-17 19:48 UTC Nmap scan report for ip-10-10-143-3.eu-west-1.compute.internal (10.10.143.3) Host is up (0.0012s latency). Not shown: 65517 closed tcp ports (reset) PORT STATE SERVICE VERSION 25/tcp open smtp hMailServer smtpd | smtp-commands: BRICK-MAIL, SIZE 20480000, AUTH LOGIN, HELP |_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY 110/tcp open pop3 hMailServer pop3d |_pop3-capabilities: UIDL TOP USER 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 143/tcp open imap hMailServer imapd |_imap-capabilities: completed IMAP4 CAPABILITY RIGHTS=texkA0001 ACL SORT IDLE NAMESPACE QUOTA CHILDREN OK IMAP4rev1 445/tcp open microsoft-ds? 587/tcp open smtp hMailServer smtpd | smtp-commands: BRICK-MAIL, SIZE 20480000, AUTH LOGIN, HELP |_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY 3389/tcp open ms-wbt-server Microsoft Terminal Services |_ssl-date: 2025-03-17T19:50:29+00:00; 0s from scanner time. | rdp-ntlm-info: | Target_Name: BRICK-MAIL | NetBIOS_Domain_Name: BRICK-MAIL | NetBIOS_Computer_Name: BRICK-MAIL | DNS_Domain_Name: BRICK-MAIL | DNS_Computer_Name: BRICK-MAIL | Product_Version: 10.0.17763 |_ System_Time: 2025-03-17T19:50:24+00:00 | ssl-cert: Subject: commonName=BRICK-MAIL | Not valid before: 2025-03-16T19:27:10 |_Not valid after: 2025-09-15T19:27:10 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Not Found |_http-server-header: Microsoft-HTTPAPI/2.0 47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Not Found |_http-server-header: Microsoft-HTTPAPI/2.0 49664/tcp open msrpc Microsoft Windows RPC 49665/tcp open msrpc Microsoft Windows RPC 49666/tcp open msrpc Microsoft Windows RPC 49667/tcp open msrpc Microsoft Windows RPC 49668/tcp open msrpc Microsoft Windows RPC 49669/tcp open msrpc Microsoft Windows RPC 49671/tcp open msrpc Microsoft Windows RPC 49674/tcp open msrpc Microsoft Windows RPC MAC Address: 02:20:2E:73:A1:33 (Unknown) Service Info: Host: BRICK-MAIL; OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: | smb2-time: | date: 2025-03-17T19:50:24 |_ start_date: N/A | smb2-security-mode: | 311: |_ Message signing enabled but not required |_nbstat: NetBIOS name: BRICK-MAIL, NetBIOS user: , NetBIOS MAC: 02202e73a133 (unknown) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 90.56 seconds
Easy CTF TryHackMe Basic Pentesting TryHackMe Bipzilla March 16, 2025 5 min read 0 This is a beginner-level CTF challenge that involves brute-forcing, hash cracking, service enumeration, and Linux enumeration. The main goal is […]