cldrn / nmap-nse-scripts

My collection of nmap NSE scripts
http://calderonpale.com
948 stars 370 forks source link

Still getting errors Attempt to call field 'pack' (a nil value) #11

Closed I-Am-Skoot closed 7 years ago

I-Am-Skoot commented 7 years ago

Here is the output with -dd option.

Note this is redacted for security.

Starting Nmap 7.25BETA1 ( https://nmap.org ) at 2017-05-25 09:19 PDT
Fetchfile found /usr/bin/../share/nmap/nmap-services
Fetchfile found /usr/bin/../share/nmap/nmap.xsl
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
NSE: Using Lua 5.2.
Fetchfile found /usr/bin/../share/nmap/nse_main.lua
Fetchfile found /usr/bin/../share/nmap/nselib/lpeg-utility.lua
Fetchfile found /usr/bin/../share/nmap/nselib/stdnse.lua
Fetchfile found /usr/bin/../share/nmap/nselib/strict.lua
Fetchfile found /usr/bin/../share/nmap/scripts/script.db
NSE: Arguments from CLI: smbusername=###########################,smbdomain=###########################,smbpassword=###########################
NSE: Arguments parsed: smbusername=###########################,smbdomain=###########################,smbpassword=###########################
NSE: {
        ["smbpassword"] = "###########################",
        ["smbdomain"] = "###########################",
        ["smbusername"] = "###########################",
}
NSE: Script smb-vuln-ms17-010.nse was selected by file path.
Fetchfile found /usr/bin/../share/nmap/nselib/smb.lua
Fetchfile found /usr/bin/../share/nmap/nselib/asn1.lua
Fetchfile found /usr/bin/../share/nmap/nselib/match.lua
Fetchfile found /usr/bin/../share/nmap/nselib/netbios.lua
Fetchfile found /usr/bin/../share/nmap/nselib/dns.lua
Fetchfile found /usr/bin/../share/nmap/nselib/ipOps.lua
Fetchfile found /usr/bin/../share/nmap/nselib/unittest.lua
Fetchfile found /usr/bin/../share/nmap/nselib/nsedebug.lua
Fetchfile found /usr/bin/../share/nmap/nselib/listop.lua
Fetchfile found /usr/bin/../share/nmap/nselib/base32.lua
Fetchfile found /usr/bin/../share/nmap/nselib/smbauth.lua
Fetchfile found /usr/bin/../share/nmap/nselib/unicode.lua
Fetchfile found /usr/bin/../share/nmap/nselib/vulns.lua
NSE: Loaded 1 scripts for scanning.
NSE: Loaded './WannaCry/smb-vuln-ms17-010.nse'.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 09:19
Completed NSE at 09:19, 0.00s elapsed
Fetchfile found /usr/bin/../share/nmap/nmap-payloads
Initiating Ping Scan at 09:19
Scanning [IP ADDRESS] [2 ports]
CONN (0.2263s) TCP localhost > [IP ADDRESS]:80 => Operation now in progress
CONN (0.2264s) TCP localhost > [IP ADDRESS]:443 => Operation now in progress
**TIMING STATS** (0.2264s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/
   Groupstats (1/1 incomplete): 2/*/*/*/*/* 10.00/75/* 1000000/-1/-1
Current sending rates: 14925.37 packets / s.
Overall sending rates: 14925.37 packets / s.
CONN (0.2269s) TCP localhost > [IP ADDRESS]:80 => Connection refused
ultrascan_host_probe_update called for machine [IP ADDRESS] state UNKNOWN -> HOST_UP (trynum 0 time: 655)
Changing ping technique for [IP ADDRESS] to connect to port 80
Moving [IP ADDRESS] to completed hosts list with 0 outstanding probes.
Changing global ping host to [IP ADDRESS].
Completed Ping Scan at 09:19, 0.00s elapsed (1 total hosts)
Overall sending rates: 2706.36 packets / s.
mass_rdns: Using DNS server [IP ADDRESS]
mass_rdns: Using DNS server [IP ADDRESS]
NSOCK INFO [0.2270s] nsock_iod_new2(): nsock_iod_new (IOD #1)
NSOCK INFO [0.2270s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:53 (IOD #1) EID 8
NSOCK INFO [0.2270s] nsock_read(): Read request from IOD #1 [[IP ADDRESS]:53] (timeout: -1ms) EID 18
NSOCK INFO [0.2270s] nsock_iod_new2(): nsock_iod_new (IOD #2)
NSOCK INFO [0.2270s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:53 (IOD #2) EID 24
NSOCK INFO [0.2270s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:53] (timeout: -1ms) EID 34
Initiating Parallel DNS resolution of 1 host. at 09:19
NSOCK INFO [0.2270s] nsock_write(): Write request for 43 bytes to IOD #1 EID 43 [[IP ADDRESS]:53]
NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [[IP ADDRESS]:53]
NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [[IP ADDRESS]:53]
NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 24 [[IP ADDRESS]:53]
NSOCK INFO [0.2280s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 18 [[IP ADDRESS]:53] (120 bytes)
NSOCK INFO [0.2280s] nsock_read(): Read request from IOD #1 [[IP ADDRESS]:53] (timeout: -1ms) EID 50
NSOCK INFO [0.2280s] nsock_iod_delete(): nsock_iod_delete (IOD #1)
NSOCK INFO [0.2280s] nevent_delete(): nevent_delete on event #50 (type READ)
NSOCK INFO [0.2280s] nsock_iod_delete(): nsock_iod_delete (IOD #2)
NSOCK INFO [0.2280s] nevent_delete(): nevent_delete on event #34 (type READ)
mass_rdns: 0.00s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
Completed Parallel DNS resolution of 1 host. at 09:19, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 09:19
Scanning [IP ADDRESS] [1 port]
CONN (0.2287s) TCP localhost > [IP ADDRESS]:445 => Operation now in progress
**TIMING STATS** (0.2287s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/
   Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 1000000/-1/-1
Current sending rates: 12345.68 packets / s.
Overall sending rates: 12345.68 packets / s.
CONN (0.2293s) TCP localhost > [IP ADDRESS]:445 => Connected
Discovered open port 445/tcp on [IP ADDRESS]
Moving [IP ADDRESS] to completed hosts list with 0 outstanding probes.
Changing global ping host to [IP ADDRESS].
Completed Connect Scan at 09:19, 0.00s elapsed (1 total ports)
Overall sending rates: 1470.59 packets / s.
NSE: Script scanning [IP ADDRESS].
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 09:19
NSE: Starting smb-vuln-ms17-010 M:21068a0 against [IP ADDRESS].
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Encoding name '*'
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] => ' CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Performing nbstat on host '[IP ADDRESS]'
NSOCK INFO [0.2280s] nsock_iod_new2(): nsock_iod_new (IOD #1)
NSOCK INFO [0.2290s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:137 (IOD #1) EID 8
NSOCK INFO [0.2290s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [[IP ADDRESS]:137]
NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | CONNECT
NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | 00000000: 13 37 00 00 00 01 00 00 00 00 00 00 20 43 4b 41  7           CKA
00000010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
00000020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 AAAAAAAAAAAAA  !
00000030: 00 01

NSOCK INFO [0.2290s] nsock_write(): Write request for 50 bytes to IOD #1 EID 19 [[IP ADDRESS]:137]
NSOCK INFO [0.2290s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 19 [[IP ADDRESS]:137]
NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | SEND
NSOCK INFO [0.2290s] nsock_readbytes(): Read request for 1 bytes from IOD #1 [[IP ADDRESS]:137] EID 26
NSOCK INFO [1.2290s] nsock_trace_handler_callback(): Callback: READ TIMEOUT for EID 26 [[IP ADDRESS]:137]
NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | CLOSE
NSOCK INFO [1.2290s] nsock_iod_delete(): nsock_iod_delete (IOD #1)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Starting SMB session for  ([IP ADDRESS])
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account '' to account list
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account 'guest' to account list
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account '###########################' to account list
NSOCK INFO [1.2290s] nsock_iod_new2(): nsock_iod_new (IOD #2)
NSOCK INFO [1.2300s] nsock_connect_tcp(): TCP connection requested to [IP ADDRESS]:445 (IOD #2) EID 32
NSOCK INFO [1.2300s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 32 [[IP ADDRESS]:445]
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | CONNECT
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_NEGOTIATE
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (missing mac_key)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 53, attempts remaining: 4)
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 31 ff 53 4d 42 72 00 00 00 00 18 45 68    1 SMBr     Eh
00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 70               ,p
00000020: 00 00 01 00 00 0e 00 02 4e 54 20 4c 4d 20 30 2e         NT LM 0.
00000030: 31 32 00 02 00                                  12

NSOCK INFO [1.2310s] nsock_write(): Write request for 53 bytes to IOD #2 EID 43 [[IP ADDRESS]:445]
NSOCK INFO [1.2310s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [[IP ADDRESS]:445]
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet
NSOCK INFO [1.2310s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 50
NSOCK INFO [1.2320s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 50 [[IP ADDRESS]:445] (209 bytes)
NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 cd ff 53 4d 42 72 00 00 00 00 98 45 68      SMBr     Eh
00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 70               ,p
00000020: 00 00 01 00 11 00 00 03 32 00 01 00 04 11 00 00         2
00000030: 00 00 01 00 00 00 00 00 fc e3 01 80 7b 1e bb 58             {  X
00000040: 73 d5 d2 01 a4 01 00 88 00 8f 9e 71 a8 be 34 1e s          q  4
00000050: 46 b5 af 31 74 1e 36 5b e9 60 76 06 06 2b 06 01 F  1t 6[ `v  +
00000060: 05 05 02 a0 6c 30 6a a0 3c 30 3a 06 0a 2b 06 01     l0j <0:  +
00000070: 04 01 82 37 02 02 1e 06 09 2a 86 48 82 f7 12 01    7     * H
00000080: 02 02 06 09 2a 86 48 86 f7 12 01 02 02 06 0a 2a     * H        *
00000090: 86 48 86 f7 12 01 02 02 03 06 0a 2b 06 01 04 01  H         +
000000a0: 82 37 02 02 0a a3 2a 30 28 a0 26 1b 24 6e 6f 74  7    *0( & $not
000000b0: 5f 64 65 66 69 6e 65 64 5f 69 6e 5f 52 46 43 34 _defined_in_RFC4
000000c0: 31 37 38 40 70 6c 65 61 73 65 5f 69 67 6e 6f 72 178@please_ignor
000000d0: 65                                              e

NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (missing mac_key)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 209 bytes
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_SESSION_SETUP_ANDX
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 149, attempts remaining: 4)
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 91 ff 53 4d 42 73 00 00 00 00 18 45 68      SMBs     Eh
00000010: 00 00 48 c4 d6 7b 8c 52 c8 8c 00 00 00 00 2c 70   H  { R      ,p
00000020: 00 00 01 00 0c ff 00 91 00 ff ff 01 00 01 00 00
00000030: 00 00 00 42 00 00 00 00 00 50 00 00 80 56 00 60    B     P   V `
00000040: 40 06 06 2b 06 01 05 05 02 a0 36 30 34 a0 0e 30 @  +      604  0
00000050: 0c 06 0a 2b 06 01 04 01 82 37 02 02 0a a2 22 04    +     7    "
00000060: 20 4e 54 4c 4d 53 53 50 00 01 00 00 00 15 82 08  NTLMSSP
00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00000080: 00 4e 6d 61 70 00 4e 61 74 69 76 65 20 4c 61 6e  Nmap Native Lan
00000090: 6d 61 6e 00 00                                  man

NSOCK INFO [1.2320s] nsock_write(): Write request for 149 bytes to IOD #2 EID 59 [[IP ADDRESS]:445]
NSOCK INFO [1.2320s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 59 [[IP ADDRESS]:445]
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet
NSOCK INFO [1.2320s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 66
NSOCK INFO [1.2330s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 66 [[IP ADDRESS]:445] (373 bytes)
NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 01 71 ff 53 4d 42 73 16 00 00 c0 98 45 68    q SMBs     Eh
00000010: 00 00 48 c4 d6 7b 8c 52 c8 8c 00 00 00 00 2c 70   H  { R      ,p
00000020: 00 08 01 00 04 ff 00 71 01 00 00 04 01 46 01 a1        q     F
00000030: 82 01 00 30 81 fd a0 03 0a 01 01 a1 0c 06 0a 2b    0           +
00000040: 06 01 04 01 82 37 02 02 0a a2 81 e7 04 81 e4 4e      7         N
00000050: 54 4c 4d 53 53 50 00 02 00 00 00 0a 00 0a 00 38 TLMSSP         8
00000060: 00 00 00 15 82 89 02 7c e3 97 c6 54 c1 52 fe 00        |   T R
00000070: 00 00 00 00 00 00 00 a2 00 a2 00 42 00 00 00 06            B
[REDACTED]
00000120: 00 6d 00 07 00 08 00 7b 1e bb 58 73 d5 d2 01 00  m     {  Xs
00000130: 00 00 00 57 69 6e 64 6f 77 73 20 37 20 45 6e 74    Windows 7 Ent
00000140: 65 72 70 72 69 73 65 20 37 36 30 31 20 53 65 72 erprise 7601 Ser
00000150: 76 69 63 65 20 50 61 63 6b 20 31 00 57 69 6e 64 vice Pack 1 Wind
00000160: 6f 77 73 20 37 20 45 6e 74 65 72 70 72 69 73 65 ows 7 Enterprise
00000170: 20 36 2e 31 00                                   6.1

NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 373 bytes
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] LM Password: ###########################
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Lanman hash: ###########################
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: NTLM   hash: ###########################
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Creating NTLMv1 response
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Lanman response: ###########################
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: NTLM   response: ###########################
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_SESSION_SETUP_ANDX
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 263, attempts remaining: 4)
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 01 03 ff 53 4d 42 73 00 00 00 00 18 45 68      SMBs     Eh
00000010: 00 00 29 66 06 29 27 d0 25 46 00 00 00 00 2c 70   )f )' %F    ,p
00000020: 00 08 01 00 0c ff 00 03 01 ff ff 01 00 01 00 00
00000030: 00 00 00 b4 00 00 00 00 00 50 00 00 80 c8 00 a1          P
00000040: 81 b1 30 81 ae a2 81 ab 04 81 a8 4e 54 4c 4d 53   0        NTLMS
00000050: 53 50 00 03 00 00 00 18 00 18 00 68 00 00 00 08 SP         h
00000060: 00 08 00 80 00 00 00 0a 00 0a 00 40 00 00 00 16            @
00000070: 00 16 00 4a 00 00 00 08 00 08 00 60 00 00 00 10    J       `
[REDACTED]
000000b0: 00 70 00 6c 39 85 17 7c bf 42 93 8b d9 1a da 46  p l9  | B     F
000000c0: cd 4c 82 da c5 c0 9c 88 a1 36 f8 6c 39 85 17 7c  L       6 l9  |
000000d0: bf 42 93 8b d9 1a da 46 cd 4c 82 da c5 c0 9c 88  B     F L
000000e0: a1 36 f8 00 00 00 00 00 00 00 00 00 00 00 00 00  6
000000f0: 00 00 00 4e 6d 61 70 00 4e 61 74 69 76 65 20 4c    Nmap Native L
00000100: 61 6e 6d 61 6e 00 00                            anman

NSOCK INFO [1.2340s] nsock_write(): Write request for 263 bytes to IOD #2 EID 75 [[IP ADDRESS]:445]
NSOCK INFO [1.2340s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 75 [[IP ADDRESS]:445]
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet
NSOCK INFO [1.2350s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 82
NSOCK INFO [1.2390s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 82 [[IP ADDRESS]:445] (122 bytes)
NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 76 ff 53 4d 42 73 00 00 00 00 98 45 68    v SMBs     Eh
00000010: 00 00 29 66 06 29 27 d0 25 46 00 00 00 00 2c 70   )f )' %F    ,p
00000020: 00 08 01 00 04 ff 00 76 00 00 00 09 00 4b 00 a1        v     K
00000030: 07 30 05 a0 03 0a 01 00 57 69 6e 64 6f 77 73 20  0      Windows
00000040: 37 20 45 6e 74 65 72 70 72 69 73 65 20 37 36 30 7 Enterprise 760
00000050: 31 20 53 65 72 76 69 63 65 20 50 61 63 6b 20 31 1 Service Pack 1
00000060: 00 57 69 6e 64 6f 77 73 20 37 20 45 6e 74 65 72  Windows 7 Enter
00000070: 70 72 69 73 65 20 36 2e 31 00                   prise 6.1

NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 122 bytes
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Extended login to [IP ADDRESS] as ###########################\########################### succeeded
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_TREE_CONNECT_ANDX
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 73, attempts remaining: 4)
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 45 ff 53 4d 42 75 00 00 00 00 18 45 68    E SMBu     Eh
00000010: 00 00 64 b8 bd f4 4e fe 88 d5 00 00 00 00 2c 70   d   N       ,p
00000020: 00 08 01 00 04 ff 00 00 00 00 00 00 00 1a 00 5c                \
00000030: 5c 31 39 32 2e 31 36 38 2e 34 2e 31 32 5c 49 50 \[IP ADDRESS]\IP
00000040: 43 24 00 3f 3f 3f 3f 3f 00                      C$ ?????

NSOCK INFO [1.2390s] nsock_write(): Write request for 73 bytes to IOD #2 EID 91 [[IP ADDRESS]:445]
NSOCK INFO [1.2390s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 91 [[IP ADDRESS]:445]
NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet
NSOCK INFO [1.2390s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 98
NSOCK INFO [1.2400s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 98 [[IP ADDRESS]:445] (50 bytes): .....SMBu.....Eh..d...N.......,p.............IPC..
NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 2e ff 53 4d 42 75 00 00 00 00 98 45 68    . SMBu     Eh
00000010: 00 00 64 b8 bd f4 4e fe 88 d5 00 00 00 08 2c 70   d   N       ,p
00000020: 00 08 01 00 03 ff 00 2e 00 01 00 05 00 49 50 43        .     IPC
00000030: 00 00

NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default)
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 50 bytes
NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Connected to share 'IPC$'
NSE: smb-vuln-ms17-010 M:21068a0 against [IP ADDRESS] threw an error!
./WannaCry/smb-vuln-ms17-010.nse:91: attempt to call field 'pack' (a nil value)
stack traceback:
        ./WannaCry/smb-vuln-ms17-010.nse:91: in function 'check_ms17010'
        ./WannaCry/smb-vuln-ms17-010.nse:164: in function <./WannaCry/smb-vuln-ms17-010.nse:142>
        (...tail calls...)

NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | CLOSE
NSOCK INFO [1.2400s] nsock_iod_delete(): nsock_iod_delete (IOD #2)
Completed NSE at 09:19, 1.01s elapsed
Nmap scan report for [IP ADDRESS]
Host is up, received conn-refused (0.00061s latency).
Scanned at 2017-05-25 09:19:19 PDT for 1s
PORT    STATE SERVICE      REASON
445/tcp open  microsoft-ds syn-ack
Final times for host: srtt: 606 rttvar: 3754  to: 100000

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 09:19
Completed NSE at 09:19, 0.00s elapsed
Read from /usr/bin/../share/nmap: nmap-payloads nmap-services.
Nmap done: 1 IP address (1 host up) scanned in 1.24 seconds