Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13eb25d195e6cb1f71d54c33210
Found open SMB shares with Guest login ADMIN$ C$ D$ FR6Share IPC$ print$ Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13eb25d195e6cb1f71d229c1565
Found open SMB shares with Guest login ADMIN$ C$ D$ FR6Share IPC$ Users
Open service 122.160.62.3:445
2024-06-19 22:31
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-17 21:54
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-14 12:55
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-12 21:38
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-11 22:03
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-09 21:14
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER
Open service 122.160.62.3:445
2024-06-07 20:13
SMB NTLMSSP handshake results: Found Windows 10.0 build 22621 NbComputerName: SHAMSERVER NbDomainName: SHAMSERVER DNSComputerName: SHAMSERVER DNSDomainName: SHAMSERVER