-1369929858 | 2024-11-15T19:54:51.636154
1433 /
tcp
MS-SQL NTLM Info:
OS: Windows 10 (version 1607)/Windows Server 2016 (version 1607)
OS Build: 10.0.14393
Target Name: OMP
NetBIOS Domain Name: OMP
NetBIOS Computer Name: OMP
DNS Domain Name: OMP
FQDN: OMP
-1870145182 | 2024-11-15T20:48:20.014513
3389 /
tcp
Remote Desktop Protocol NTLM Info:
OS: Windows 10 (version 1607)/Windows Server 2016 (version 1607)
OS Build: 10.0.14393
Target Name: OMP
NetBIOS Domain Name: OMP
NetBIOS Computer Name: OMP
DNS Domain Name: OMP
FQDN: OMP
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7f:3c:c4:d3:af:27:da:a2:44:fa:dd:73:99:81:a9:be
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=OMP
Validity
Not Before: Jul 15 19:46:08 2024 GMT
Not After : Jan 14 19:46:08 2025 GMT
Subject: CN=OMP
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:a1:c9:f5:90:4d:ba:54:e6:d8:cb:57:8b:58:7c:
b5:9c:b1:34:e6:47:d3:05:ff:ff:b3:56:59:ab:0b:
19:cd:e9:f7:06:8f:28:24:e8:ba:8c:99:c8:e3:a2:
65:b7:36:ad:ee:bc:5e:85:50:7e:87:ba:95:7c:27:
0e:62:af:29:7b:bd:2b:d8:4b:6c:f3:2c:af:c6:67:
9f:c6:90:f2:cb:10:36:1b:e0:e8:58:4b:47:30:42:
c9:ea:cd:04:44:15:7e:75:aa:5a:30:d1:64:2f:5e:
48:38:b9:52:f1:20:02:89:c7:3b:5e:3e:8f:f3:e1:
10:af:19:18:39:5c:22:22:d0:9e:fd:e8:26:f5:8c:
2c:99:aa:1d:21:97:3c:eb:2a:e4:49:ed:ec:a3:30:
5c:da:cd:50:92:0e:dc:44:a8:9d:f6:a4:39:39:03:
e5:8b:bd:8d:13:0e:0e:c3:33:0f:16:aa:47:23:00:
c1:60:1f:51:5f:95:10:4c:87:e8:e9:e9:f2:22:28:
de:6b:df:9d:db:b9:ac:6f:a8:1b:af:1e:15:ad:5a:
c3:5a:14:d5:b9:cd:4a:6d:2f:41:25:de:40:7c:c8:
5b:c9:3f:c3:e7:1a:28:fb:f4:45:42:b2:0f:ae:b8:
4e:63:80:53:bf:49:d7:34:72:ac:3a:16:3b:d5:4a:
8c:69
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 Key Usage:
Key Encipherment, Data Encipherment
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
3c:50:92:7e:b0:49:a7:06:6f:ae:5a:e6:79:61:3a:32:2b:05:
ef:82:b4:cb:a0:50:c5:1c:89:ce:52:61:30:2a:46:2d:6c:5d:
b2:ca:91:34:89:8f:76:02:10:e1:2b:32:2a:d5:b7:6f:c1:6d:
dd:7c:0b:04:9a:41:37:dc:7d:6d:d0:88:da:4f:43:4d:a2:f8:
f3:2e:35:4c:28:a9:18:a8:aa:52:23:9f:4c:d1:ac:b2:88:e8:
e3:36:f1:a0:27:d9:6e:14:fc:cd:8c:34:f5:db:8a:39:93:92:
78:b2:ac:5c:49:a6:25:ca:4d:1a:4a:f6:1c:3e:45:4d:06:31:
00:54:c6:10:0e:e6:2e:bc:a0:cd:5f:23:32:72:f8:5b:20:ec:
19:15:6b:85:90:72:ab:8b:cd:38:fa:0c:52:11:a8:e3:f5:5c:
e5:34:60:44:88:6c:15:4b:c6:b2:fa:b4:24:f3:de:b9:ff:41:
9f:78:c3:95:ab:6c:ad:1e:ea:14:84:14:f0:15:87:2b:17:5e:
bf:b5:f2:2d:c6:e6:45:33:02:67:fd:d9:9f:a5:8f:e9:6a:85:
aa:77:f8:8b:be:61:f3:8c:d9:c8:4b:f8:d9:bf:b7:17:eb:f6:
e2:65:60:b0:92:fb:46:4d:17:f9:80:ca:45:20:b3:c4:1e:d8:
49:e4:c7:8a
1982639300 | 2024-11-11T04:19:35.518052
5800 /
tcp
HTTP/1.1 200 OK
Server: RealVNC/E4
Date: Mon, 11 Nov 2024 04:19:33 GMT
Cache-Control: no-cache
Content-Type: text/html
Connection: close
1489525118 | 2024-11-15T02:14:45.828927
5985 /
tcp
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Fri, 15 Nov 2024 02:13:48 GMT
Connection: close
Content-Length: 315
WinRM NTLM Info:
OS: Windows Server 2016 (version 1607)
OS Build: 10.0.14393
Target Name: OMP
NetBIOS Domain Name: OMP
NetBIOS Computer Name: OMP
DNS Domain Name: OMP
FQDN: OMP
-323488026 | 2024-11-02T09:15:51.752599
9001 /
tcp
.NET\x01\x00\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x03\x01\x00\x03\x00\x01\x01\x0e\x02\x00\x00System.Runtime.Remoting.RemotingException: TCP \xe4\xbf\xa1\xe9\x81\x93\xe5\x8d\x8f\xe8\xae\xae\xe5\x86\xb2\xe7\xaa\x81: \xe5\xba\x94\xe4\xb8\xba\xe6\x8a\xa5\xe5\xa4\xb4\xe3\x80\x82\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpSocketHandler.ReadAndMatchPreamble()\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpSocketHandler.ReadVersionAndOperation(UInt16& operation)\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpServerSocketHandler.ReadHeaders()\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpServerTransportSink.ServiceRequest(Object state)\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.SocketHandler.ProcessRequestNow()\x05\x00\x00\x00\x00
-323488026 | 2024-10-22T05:01:18.319711
9002 /
tcp
.NET\x01\x00\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x03\x01\x00\x03\x00\x01\x01\x0e\x02\x00\x00System.Runtime.Remoting.RemotingException: TCP \xe4\xbf\xa1\xe9\x81\x93\xe5\x8d\x8f\xe8\xae\xae\xe5\x86\xb2\xe7\xaa\x81: \xe5\xba\x94\xe4\xb8\xba\xe6\x8a\xa5\xe5\xa4\xb4\xe3\x80\x82\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpSocketHandler.ReadAndMatchPreamble()\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpSocketHandler.ReadVersionAndOperation(UInt16& operation)\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpServerSocketHandler.ReadHeaders()\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.Tcp.TcpServerTransportSink.ServiceRequest(Object state)\r\n \xe5\x9c\xa8 System.Runtime.Remoting.Channels.SocketHandler.ProcessRequestNow()\x05\x00\x00\x00\x00