Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3802ee83116e3564f16e3564f16e3564f16e3564f
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON hina IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3802ee831314f8321ce6457dfce6457dfce6457df
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON hina sayo IPC$
Open service 88.198.103.224:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-20 00:32
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-18 01:38
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-15 23:18
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-13 23:01
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-11 23:15
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-12-01 23:35
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-11-29 23:12
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 88.198.103.224:445
2024-11-28 00:23
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0