Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13e4eab31aeaffaeedc574e9ce4
Found open SMB shares with Guest login ADMIN$ C$ DATA IPC$ Users
Open service 77.28.99.21:445
2024-05-08 12:53
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm
Open service 77.28.99.21:445
2024-04-30 19:09
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm
Open service 77.28.99.21:445
2024-04-28 18:32
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm
Open service 77.28.99.21:445
2024-04-26 05:14
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm
Open service 77.28.99.21:445
2024-04-24 19:06
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm
Open service 77.28.99.21:445
2024-04-18 18:04
SMB NTLMSSP handshake results: Found Windows 10.0 build 17763 NbComputerName: EVN-ALARM NbDomainName: EVN-ALARM DNSComputerName: EVN-Alarm DNSDomainName: EVN-Alarm