Mice
Enumeration:
Port Scanning:
┌──(kali㉿kali)-[~/…/Machines/OffsecPG/Practice/Mice]
└─$ sudo nmap -sCV -p- --min-rate 4000 -oA nmap/services -vv 192.168.182.199
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-10 13:19 EST
Nmap scan report for 192.168.182.199
Host is up, received echo-reply ttl 125 (0.13s latency).
Scanned at 2025-11-10 13:19:45 EST for 242s
Not shown: 65530 filtered tcp ports (no-response)
PORT STATE SERVICE REASON VERSION
1978/tcp open remotemouse syn-ack ttl 125 Emote Remote Mouse
1979/tcp open unisql-java? syn-ack ttl 125
1980/tcp open pearldoc-xact? syn-ack ttl 125
3389/tcp open ms-wbt-server syn-ack ttl 125 Microsoft Terminal Services
|_ssl-date: 2025-11-10T18:23:48+00:00; +2s from scanner time.
| ssl-cert: Subject: commonName=Remote-PC
| Issuer: commonName=Remote-PC
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-25T10:09:25
| Not valid after: 2026-02-24T10:09:25
| MD5: ee3d:e4de:8e91:a5b4:7115:34cb:986a:f8bd
| SHA-1: 093c:db26:68db:b772:9089:ad5a:833b:90f8:d929:4eb7
| -----BEGIN CERTIFICATE-----
| MIIC1jCCAb6gAwIBAgIQdK7WCoPG665IL5mbwZdubTANBgkqhkiG9w0BAQsFADAU
<snipped>
|_-----END CERTIFICATE-----
| rdp-ntlm-info:
| Target_Name: REMOTE-PC
| NetBIOS_Domain_Name: REMOTE-PC
| NetBIOS_Computer_Name: REMOTE-PC
| DNS_Domain_Name: Remote-PC
| DNS_Computer_Name: Remote-PC
| Product_Version: 10.0.19041
|_ System_Time: 2025-11-10T18:23:19+00:00
7680/tcp open pando-pub? syn-ack ttl 125
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
<snipped>
Exploitaion:
Post-Exploitation:









Last updated