Closed I-Am-Skoot closed 7 years ago
Here is the output with -dd option.
Note this is redacted for security.
Starting Nmap 7.25BETA1 ( https://nmap.org ) at 2017-05-25 09:19 PDT Fetchfile found /usr/bin/../share/nmap/nmap-services Fetchfile found /usr/bin/../share/nmap/nmap.xsl The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- NSE: Using Lua 5.2. Fetchfile found /usr/bin/../share/nmap/nse_main.lua Fetchfile found /usr/bin/../share/nmap/nselib/lpeg-utility.lua Fetchfile found /usr/bin/../share/nmap/nselib/stdnse.lua Fetchfile found /usr/bin/../share/nmap/nselib/strict.lua Fetchfile found /usr/bin/../share/nmap/scripts/script.db NSE: Arguments from CLI: smbusername=###########################,smbdomain=###########################,smbpassword=########################### NSE: Arguments parsed: smbusername=###########################,smbdomain=###########################,smbpassword=########################### NSE: { ["smbpassword"] = "###########################", ["smbdomain"] = "###########################", ["smbusername"] = "###########################", } NSE: Script smb-vuln-ms17-010.nse was selected by file path. Fetchfile found /usr/bin/../share/nmap/nselib/smb.lua Fetchfile found /usr/bin/../share/nmap/nselib/asn1.lua Fetchfile found /usr/bin/../share/nmap/nselib/match.lua Fetchfile found /usr/bin/../share/nmap/nselib/netbios.lua Fetchfile found /usr/bin/../share/nmap/nselib/dns.lua Fetchfile found /usr/bin/../share/nmap/nselib/ipOps.lua Fetchfile found /usr/bin/../share/nmap/nselib/unittest.lua Fetchfile found /usr/bin/../share/nmap/nselib/nsedebug.lua Fetchfile found /usr/bin/../share/nmap/nselib/listop.lua Fetchfile found /usr/bin/../share/nmap/nselib/base32.lua Fetchfile found /usr/bin/../share/nmap/nselib/smbauth.lua Fetchfile found /usr/bin/../share/nmap/nselib/unicode.lua Fetchfile found /usr/bin/../share/nmap/nselib/vulns.lua NSE: Loaded 1 scripts for scanning. NSE: Loaded './WannaCry/smb-vuln-ms17-010.nse'. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 09:19 Completed NSE at 09:19, 0.00s elapsed Fetchfile found /usr/bin/../share/nmap/nmap-payloads Initiating Ping Scan at 09:19 Scanning [IP ADDRESS] [2 ports] CONN (0.2263s) TCP localhost > [IP ADDRESS]:80 => Operation now in progress CONN (0.2264s) TCP localhost > [IP ADDRESS]:443 => Operation now in progress **TIMING STATS** (0.2264s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 2/*/*/*/*/* 10.00/75/* 1000000/-1/-1 Current sending rates: 14925.37 packets / s. Overall sending rates: 14925.37 packets / s. CONN (0.2269s) TCP localhost > [IP ADDRESS]:80 => Connection refused ultrascan_host_probe_update called for machine [IP ADDRESS] state UNKNOWN -> HOST_UP (trynum 0 time: 655) Changing ping technique for [IP ADDRESS] to connect to port 80 Moving [IP ADDRESS] to completed hosts list with 0 outstanding probes. Changing global ping host to [IP ADDRESS]. Completed Ping Scan at 09:19, 0.00s elapsed (1 total hosts) Overall sending rates: 2706.36 packets / s. mass_rdns: Using DNS server [IP ADDRESS] mass_rdns: Using DNS server [IP ADDRESS] NSOCK INFO [0.2270s] nsock_iod_new2(): nsock_iod_new (IOD #1) NSOCK INFO [0.2270s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:53 (IOD #1) EID 8 NSOCK INFO [0.2270s] nsock_read(): Read request from IOD #1 [[IP ADDRESS]:53] (timeout: -1ms) EID 18 NSOCK INFO [0.2270s] nsock_iod_new2(): nsock_iod_new (IOD #2) NSOCK INFO [0.2270s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:53 (IOD #2) EID 24 NSOCK INFO [0.2270s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:53] (timeout: -1ms) EID 34 Initiating Parallel DNS resolution of 1 host. at 09:19 NSOCK INFO [0.2270s] nsock_write(): Write request for 43 bytes to IOD #1 EID 43 [[IP ADDRESS]:53] NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [[IP ADDRESS]:53] NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [[IP ADDRESS]:53] NSOCK INFO [0.2270s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 24 [[IP ADDRESS]:53] NSOCK INFO [0.2280s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 18 [[IP ADDRESS]:53] (120 bytes) NSOCK INFO [0.2280s] nsock_read(): Read request from IOD #1 [[IP ADDRESS]:53] (timeout: -1ms) EID 50 NSOCK INFO [0.2280s] nsock_iod_delete(): nsock_iod_delete (IOD #1) NSOCK INFO [0.2280s] nevent_delete(): nevent_delete on event #50 (type READ) NSOCK INFO [0.2280s] nsock_iod_delete(): nsock_iod_delete (IOD #2) NSOCK INFO [0.2280s] nevent_delete(): nevent_delete on event #34 (type READ) mass_rdns: 0.00s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1] Completed Parallel DNS resolution of 1 host. at 09:19, 0.00s elapsed DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating Connect Scan at 09:19 Scanning [IP ADDRESS] [1 port] CONN (0.2287s) TCP localhost > [IP ADDRESS]:445 => Operation now in progress **TIMING STATS** (0.2287s): IP, probes active/freshportsleft/retry_stack/outstanding/retranwait/onbench, cwnd/ssthresh/delay, timeout/srtt/rttvar/ Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 1000000/-1/-1 Current sending rates: 12345.68 packets / s. Overall sending rates: 12345.68 packets / s. CONN (0.2293s) TCP localhost > [IP ADDRESS]:445 => Connected Discovered open port 445/tcp on [IP ADDRESS] Moving [IP ADDRESS] to completed hosts list with 0 outstanding probes. Changing global ping host to [IP ADDRESS]. Completed Connect Scan at 09:19, 0.00s elapsed (1 total ports) Overall sending rates: 1470.59 packets / s. NSE: Script scanning [IP ADDRESS]. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 09:19 NSE: Starting smb-vuln-ms17-010 M:21068a0 against [IP ADDRESS]. NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Encoding name '*' NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] => ' CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA' NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Performing nbstat on host '[IP ADDRESS]' NSOCK INFO [0.2280s] nsock_iod_new2(): nsock_iod_new (IOD #1) NSOCK INFO [0.2290s] nsock_connect_udp(): UDP connection requested to [IP ADDRESS]:137 (IOD #1) EID 8 NSOCK INFO [0.2290s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 8 [[IP ADDRESS]:137] NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | CONNECT NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | 00000000: 13 37 00 00 00 01 00 00 00 00 00 00 20 43 4b 41 7 CKA 00000010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA 00000020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 AAAAAAAAAAAAA ! 00000030: 00 01 NSOCK INFO [0.2290s] nsock_write(): Write request for 50 bytes to IOD #1 EID 19 [[IP ADDRESS]:137] NSOCK INFO [0.2290s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 19 [[IP ADDRESS]:137] NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | SEND NSOCK INFO [0.2290s] nsock_readbytes(): Read request for 1 bytes from IOD #1 [[IP ADDRESS]:137] EID 26 NSOCK INFO [1.2290s] nsock_trace_handler_callback(): Callback: READ TIMEOUT for EID 26 [[IP ADDRESS]:137] NSE: UDP [IP ADDRESS]:33553 > [IP ADDRESS]:137 | CLOSE NSOCK INFO [1.2290s] nsock_iod_delete(): nsock_iod_delete (IOD #1) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Starting SMB session for ([IP ADDRESS]) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account '' to account list NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account 'guest' to account list NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Added account '###########################' to account list NSOCK INFO [1.2290s] nsock_iod_new2(): nsock_iod_new (IOD #2) NSOCK INFO [1.2300s] nsock_connect_tcp(): TCP connection requested to [IP ADDRESS]:445 (IOD #2) EID 32 NSOCK INFO [1.2300s] nsock_trace_handler_callback(): Callback: CONNECT SUCCESS for EID 32 [[IP ADDRESS]:445] NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | CONNECT NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_NEGOTIATE NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (missing mac_key) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 53, attempts remaining: 4) NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 31 ff 53 4d 42 72 00 00 00 00 18 45 68 1 SMBr Eh 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 70 ,p 00000020: 00 00 01 00 00 0e 00 02 4e 54 20 4c 4d 20 30 2e NT LM 0. 00000030: 31 32 00 02 00 12 NSOCK INFO [1.2310s] nsock_write(): Write request for 53 bytes to IOD #2 EID 43 [[IP ADDRESS]:445] NSOCK INFO [1.2310s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 43 [[IP ADDRESS]:445] NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet NSOCK INFO [1.2310s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 50 NSOCK INFO [1.2320s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 50 [[IP ADDRESS]:445] (209 bytes) NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 cd ff 53 4d 42 72 00 00 00 00 98 45 68 SMBr Eh 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 70 ,p 00000020: 00 00 01 00 11 00 00 03 32 00 01 00 04 11 00 00 2 00000030: 00 00 01 00 00 00 00 00 fc e3 01 80 7b 1e bb 58 { X 00000040: 73 d5 d2 01 a4 01 00 88 00 8f 9e 71 a8 be 34 1e s q 4 00000050: 46 b5 af 31 74 1e 36 5b e9 60 76 06 06 2b 06 01 F 1t 6[ `v + 00000060: 05 05 02 a0 6c 30 6a a0 3c 30 3a 06 0a 2b 06 01 l0j <0: + 00000070: 04 01 82 37 02 02 1e 06 09 2a 86 48 82 f7 12 01 7 * H 00000080: 02 02 06 09 2a 86 48 86 f7 12 01 02 02 06 0a 2a * H * 00000090: 86 48 86 f7 12 01 02 02 03 06 0a 2b 06 01 04 01 H + 000000a0: 82 37 02 02 0a a3 2a 30 28 a0 26 1b 24 6e 6f 74 7 *0( & $not 000000b0: 5f 64 65 66 69 6e 65 64 5f 69 6e 5f 52 46 43 34 _defined_in_RFC4 000000c0: 31 37 38 40 70 6c 65 61 73 65 5f 69 67 6e 6f 72 178@please_ignor 000000d0: 65 e NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (missing mac_key) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 209 bytes NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_SESSION_SETUP_ANDX NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 149, attempts remaining: 4) NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 91 ff 53 4d 42 73 00 00 00 00 18 45 68 SMBs Eh 00000010: 00 00 48 c4 d6 7b 8c 52 c8 8c 00 00 00 00 2c 70 H { R ,p 00000020: 00 00 01 00 0c ff 00 91 00 ff ff 01 00 01 00 00 00000030: 00 00 00 42 00 00 00 00 00 50 00 00 80 56 00 60 B P V ` 00000040: 40 06 06 2b 06 01 05 05 02 a0 36 30 34 a0 0e 30 @ + 604 0 00000050: 0c 06 0a 2b 06 01 04 01 82 37 02 02 0a a2 22 04 + 7 " 00000060: 20 4e 54 4c 4d 53 53 50 00 01 00 00 00 15 82 08 NTLMSSP 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00000080: 00 4e 6d 61 70 00 4e 61 74 69 76 65 20 4c 61 6e Nmap Native Lan 00000090: 6d 61 6e 00 00 man NSOCK INFO [1.2320s] nsock_write(): Write request for 149 bytes to IOD #2 EID 59 [[IP ADDRESS]:445] NSOCK INFO [1.2320s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 59 [[IP ADDRESS]:445] NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet NSOCK INFO [1.2320s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 66 NSOCK INFO [1.2330s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 66 [[IP ADDRESS]:445] (373 bytes) NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 01 71 ff 53 4d 42 73 16 00 00 c0 98 45 68 q SMBs Eh 00000010: 00 00 48 c4 d6 7b 8c 52 c8 8c 00 00 00 00 2c 70 H { R ,p 00000020: 00 08 01 00 04 ff 00 71 01 00 00 04 01 46 01 a1 q F 00000030: 82 01 00 30 81 fd a0 03 0a 01 01 a1 0c 06 0a 2b 0 + 00000040: 06 01 04 01 82 37 02 02 0a a2 81 e7 04 81 e4 4e 7 N 00000050: 54 4c 4d 53 53 50 00 02 00 00 00 0a 00 0a 00 38 TLMSSP 8 00000060: 00 00 00 15 82 89 02 7c e3 97 c6 54 c1 52 fe 00 | T R 00000070: 00 00 00 00 00 00 00 a2 00 a2 00 42 00 00 00 06 B [REDACTED] 00000120: 00 6d 00 07 00 08 00 7b 1e bb 58 73 d5 d2 01 00 m { Xs 00000130: 00 00 00 57 69 6e 64 6f 77 73 20 37 20 45 6e 74 Windows 7 Ent 00000140: 65 72 70 72 69 73 65 20 37 36 30 31 20 53 65 72 erprise 7601 Ser 00000150: 76 69 63 65 20 50 61 63 6b 20 31 00 57 69 6e 64 vice Pack 1 Wind 00000160: 6f 77 73 20 37 20 45 6e 74 65 72 70 72 69 73 65 ows 7 Enterprise 00000170: 20 36 2e 31 00 6.1 NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 373 bytes NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] LM Password: ########################### NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Lanman hash: ########################### NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: NTLM hash: ########################### NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Creating NTLMv1 response NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Lanman response: ########################### NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: NTLM response: ########################### NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_SESSION_SETUP_ANDX NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 263, attempts remaining: 4) NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 01 03 ff 53 4d 42 73 00 00 00 00 18 45 68 SMBs Eh 00000010: 00 00 29 66 06 29 27 d0 25 46 00 00 00 00 2c 70 )f )' %F ,p 00000020: 00 08 01 00 0c ff 00 03 01 ff ff 01 00 01 00 00 00000030: 00 00 00 b4 00 00 00 00 00 50 00 00 80 c8 00 a1 P 00000040: 81 b1 30 81 ae a2 81 ab 04 81 a8 4e 54 4c 4d 53 0 NTLMS 00000050: 53 50 00 03 00 00 00 18 00 18 00 68 00 00 00 08 SP h 00000060: 00 08 00 80 00 00 00 0a 00 0a 00 40 00 00 00 16 @ 00000070: 00 16 00 4a 00 00 00 08 00 08 00 60 00 00 00 10 J ` [REDACTED] 000000b0: 00 70 00 6c 39 85 17 7c bf 42 93 8b d9 1a da 46 p l9 | B F 000000c0: cd 4c 82 da c5 c0 9c 88 a1 36 f8 6c 39 85 17 7c L 6 l9 | 000000d0: bf 42 93 8b d9 1a da 46 cd 4c 82 da c5 c0 9c 88 B F L 000000e0: a1 36 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 6 000000f0: 00 00 00 4e 6d 61 70 00 4e 61 74 69 76 65 20 4c Nmap Native L 00000100: 61 6e 6d 61 6e 00 00 anman NSOCK INFO [1.2340s] nsock_write(): Write request for 263 bytes to IOD #2 EID 75 [[IP ADDRESS]:445] NSOCK INFO [1.2340s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 75 [[IP ADDRESS]:445] NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet NSOCK INFO [1.2350s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 82 NSOCK INFO [1.2390s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 82 [[IP ADDRESS]:445] (122 bytes) NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 76 ff 53 4d 42 73 00 00 00 00 98 45 68 v SMBs Eh 00000010: 00 00 29 66 06 29 27 d0 25 46 00 00 00 00 2c 70 )f )' %F ,p 00000020: 00 08 01 00 04 ff 00 76 00 00 00 09 00 4b 00 a1 v K 00000030: 07 30 05 a0 03 0a 01 00 57 69 6e 64 6f 77 73 20 0 Windows 00000040: 37 20 45 6e 74 65 72 70 72 69 73 65 20 37 36 30 7 Enterprise 760 00000050: 31 20 53 65 72 76 69 63 65 20 50 61 63 6b 20 31 1 Service Pack 1 00000060: 00 57 69 6e 64 6f 77 73 20 37 20 45 6e 74 65 72 Windows 7 Enter 00000070: 70 72 69 73 65 20 36 2e 31 00 prise 6.1 NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 122 bytes NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Extended login to [IP ADDRESS] as ###########################\########################### succeeded NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB_COM_TREE_CONNECT_ANDX NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Sending SMB packet (len: 73, attempts remaining: 4) NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | 00000000: 00 00 00 45 ff 53 4d 42 75 00 00 00 00 18 45 68 E SMBu Eh 00000010: 00 00 64 b8 bd f4 4e fe 88 d5 00 00 00 00 2c 70 d N ,p 00000020: 00 08 01 00 04 ff 00 00 00 00 00 00 00 1a 00 5c \ 00000030: 5c 31 39 32 2e 31 36 38 2e 34 2e 31 32 5c 49 50 \[IP ADDRESS]\IP 00000040: 43 24 00 3f 3f 3f 3f 3f 00 C$ ????? NSOCK INFO [1.2390s] nsock_write(): Write request for 73 bytes to IOD #2 EID 91 [[IP ADDRESS]:445] NSOCK INFO [1.2390s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS for EID 91 [[IP ADDRESS]:445] NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | SEND NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Receiving SMB packet NSOCK INFO [1.2390s] nsock_read(): Read request from IOD #2 [[IP ADDRESS]:445] (timeout: 10000ms) EID 98 NSOCK INFO [1.2400s] nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 98 [[IP ADDRESS]:445] (50 bytes): .....SMBu.....Eh..d...N.......,p.............IPC.. NSE: TCP [IP ADDRESS]:37406 < [IP ADDRESS]:445 | 00000000: 00 00 00 2e ff 53 4d 42 75 00 00 00 00 98 45 68 . SMBu Eh 00000010: 00 00 64 b8 bd f4 4e fe 88 d5 00 00 00 08 2c 70 d N ,p 00000020: 00 08 01 00 03 ff 00 2e 00 01 00 05 00 49 50 43 . IPC 00000030: 00 00 NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Not signing message (server doesn't support it -- default) NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] SMB: Received 50 bytes NSE: [smb-vuln-ms17-010 M:21068a0 [IP ADDRESS]] Connected to share 'IPC$' NSE: smb-vuln-ms17-010 M:21068a0 against [IP ADDRESS] threw an error! ./WannaCry/smb-vuln-ms17-010.nse:91: attempt to call field 'pack' (a nil value) stack traceback: ./WannaCry/smb-vuln-ms17-010.nse:91: in function 'check_ms17010' ./WannaCry/smb-vuln-ms17-010.nse:164: in function <./WannaCry/smb-vuln-ms17-010.nse:142> (...tail calls...) NSE: TCP [IP ADDRESS]:37406 > [IP ADDRESS]:445 | CLOSE NSOCK INFO [1.2400s] nsock_iod_delete(): nsock_iod_delete (IOD #2) Completed NSE at 09:19, 1.01s elapsed Nmap scan report for [IP ADDRESS] Host is up, received conn-refused (0.00061s latency). Scanned at 2017-05-25 09:19:19 PDT for 1s PORT STATE SERVICE REASON 445/tcp open microsoft-ds syn-ack Final times for host: srtt: 606 rttvar: 3754 to: 100000 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 09:19 Completed NSE at 09:19, 0.00s elapsed Read from /usr/bin/../share/nmap: nmap-payloads nmap-services. Nmap done: 1 IP address (1 host up) scanned in 1.24 seconds
Here is the output with -dd option.
Note this is redacted for security.