Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13eb25d195ea821ba6c67e7e9f1
Found open SMB shares with Guest login ADMIN$ C$ D$ IPC$ SCAN Users
Open service 180.131.19.152:445
2024-06-25 20:31
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim
Open service 180.131.19.152:445
2024-06-21 22:48
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim
Open service 180.131.19.152:445
2024-06-19 21:37
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim
Open service 180.131.19.152:445
2024-06-17 21:45
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim
Open service 180.131.19.152:445
2024-06-15 21:29
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim
Open service 180.131.19.152:445
2024-06-11 20:49
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: SYKIM NbDomainName: SYKIM DNSComputerName: sykim DNSDomainName: sykim