Microsoft-HTTPAPI 2.0
tcp/80
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f7c2b0bdd1408c608670975c3175faf04
Found open SMB shares with Guest login ADMIN$ BACKUP C$ E$ F$ IPC$ PHDATA print$ Users
Open service 142.255.42.245:445
2024-09-15 23:52
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-09-13 23:38
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-09-12 01:48
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-09-11 21:06
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:82
2024-09-11 20:12
HTTP/1.0 200 OK Date: Wed, 11 Sep 2024 15:12:23 CDT Content-Type: text/xml; charset=UTF-8 <?xml version="1.0" encoding="UTF-8"?><error>Unexpected GET request file</error>
Open service 142.255.42.245:80
2024-09-10 10:25
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Tue, 10 Sep 2024 10:25:23 GMT Connection: close Content-Length: 315 Page title: Not Found <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"> <HTML><HEAD><TITLE>Not Found</TITLE> <META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD> <BODY><h2>Not Found</h2> <hr><p>HTTP Error 404. The requested resource is not found.</p> </BODY></HTML>
Open service 142.255.42.245:445
2024-09-09 20:14
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-09-07 20:15
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-17 20:49
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-15 20:51
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-13 22:57
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-11 23:03
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-09 20:05
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER
Open service 142.255.42.245:445
2024-08-07 22:45
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: PHSERVER NbDomainName: PHSERVER DNSComputerName: PHSERVER DNSDomainName: PHSERVER