2. Service and Version Detection

So now that you’ve discovered open ports like:

88/tcp     open  kerberos-sec       # Kerberos authentication for domain logins
135/tcp    open  msrpc              # Microsoft RPC endpoint mapper
139/tcp    open  netbios-ssn        # NetBIOS session service (legacy file sharing)
389/tcp    open  ldap               # LDAP directory service (domain controller indicator)
445/tcp    open  microsoft-ds       # SMB over TCP for file sharing and remote access
464/tcp    open  kpasswd5           # Kerberos password change service
593/tcp    open  http-rpc-epmap     # RPC over HTTP, used for remote management
636/tcp    open  ldapssl            # LDAP over SSL/TLS (secure LDAP)
3268/tcp   open  globalcatLDAP      # Global Catalog LDAP (non-SSL)
3269/tcp   open  globalcatLDAPssl   # Global Catalog LDAP over SSL

Tool Used: nmap

The next step is to identify the services running on those ports and their versions. This is important because once you know the version, you can check if there are any known vulnerabilities (CVEs).

✅ Use this Nmap command:

nmap -sV -p 88,135,139,389,445,464,593,636,3268,3269 -Pn 192.168.10.4

Explanation:

  • -sV → Detects the service and version

  • -p → Tells Nmap which ports to scan

  • -Pn → Skips ping (treats the host as alive)

Optional (more aggressive scan):

If you want more detailed info like OS detection and script scanning, you can add -A:

nmap -sV -A -p 88,135,139,389,445,464,593,636,3268,3269 -Pn 192.168.10.4

⚠️ Warning: The -A option is more aggressive and might trigger alerts on the target system.

Last updated