# Nmap 7.01 scan initiated Thu Feb 18 10:14:01 2016 as: nmap -Pn --script smb* and not(dos or brute) -oA /Users/calderpwn/Code/calderon/smb2/win2008 192.168.0.19 Nmap scan report for 192.168.0.19 Host is up (0.00062s latency). Not shown: 997 filtered ports PORT STATE SERVICE 135/tcp open msrpc 445/tcp open microsoft-ds 49154/tcp open unknown Host script results: | smb-enum-shares: | note: ERROR: Enumerating shares failed, guessing at common ones (NT_STATUS_ACCESS_DENIED) | account_used: | ADMIN$: | warning: Couldn't get details for share: NT_STATUS_ACCESS_DENIED | Anonymous access: | C$: | warning: Couldn't get details for share: NT_STATUS_ACCESS_DENIED | Anonymous access: | IPC$: | warning: Couldn't get details for share: NT_STATUS_ACCESS_DENIED |_ Anonymous access: READ | smb-mbenum: |_ ERROR: Call to Browser Service failed with status = 2184 | smb-os-discovery: | OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1) | OS CPE: cpe:/o:microsoft:windows_server_2008::sp1 | Computer name: WIN-CTQA8LQNBCH | NetBIOS computer name: WIN-CTQA8LQNBCH | Workgroup: WORKGROUP |_ System time: 2016-02-18T10:14:00-08:00 |_smb-print-text: false | smb-psexec: Can't find the service file: nmap_service.exe (or nmap_service). | Due to false positives in antivirus software, this module is no | longer included by default. Please download it from | https://nmap.org/psexec/nmap_service.exe |_and place it in nselib/data/psexec/ under the Nmap DATADIR. | smb-security-mode: | account_used: | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) |_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED |_smbv2-enabled: Server supports SMBv2 protocol # Nmap done at Thu Feb 18 10:16:43 2016 -- 1 IP address (1 host up) scanned in 161.97 seconds