The server is accepting NTLM anonymous credentials.
This allows for authentication bypass to access the underlying application.
https://blog.leakix.net/2022/03/bypassing-ntlm-auth-over-http/
Fingerprint: 40fea8e6a9bd2c3671ce48dbe86f199c98a4427ae5b5270debeebd328ce49d38
Server didn't refuse ANONYMOUS NTLM connection Found NTLM information: Running Windows 10.0 build 20348 MsvAvNbComputerName: WIN-T1HO0IWDOUQ MsvAvNbDomainName: 2KHL MsvAvDNSComputerName: WIN-T1HO0IWDOUQ.2KHL.LOCAL MsvAvDNSDomainName: 2KHL.LOCAL MsvAvDNSTreeName: 2KHL.LOCAL 200 OK Content-Length: 0 Content-Type: text/html Date: Thu, 21 Nov 2024 17:05:18 GMT Server: Microsoft-IIS/10.0 Www-Authenticate: NTLM
Fingerprint: 40fea8e6a9bd2c3671ce48dbe86f199c98a4427aaa9333cb035ce53abcfcc56c
Server didn't refuse ANONYMOUS NTLM connection Found NTLM information: Running Windows 10.0 build 20348 MsvAvNbComputerName: WIN-QY9UY9LV7P2 MsvAvNbDomainName: HWWI MsvAvDNSComputerName: WIN-QY9UY9LV7P2.HWWI.LOCAL MsvAvDNSDomainName: HWWI.LOCAL MsvAvDNSTreeName: HWWI.LOCAL 200 OK Content-Length: 0 Content-Type: text/html Date: Wed, 20 Nov 2024 05:48:51 GMT Server: Microsoft-IIS/10.0 Www-Authenticate: NTLM