DOMAIN MACHINE ┌──(root㉿kali)-[/home/kali/Descargas] └─# bash auto_deploy.sh domain.tar Estamos desplegando la máquina vulnerable, espere un momento. Máquina desplegada, su dirección IP es --> 172.17.0.2 Presiona Ctrl+C cuando termines con la máquina para eliminarla Once the host was identified, Nmap, a port scanning tool, was used to discover which services were running on the machine. The scan revealed port 80 (HTTP), 445 (SMB) and 139 (SMB) was open. ┌──(kali㉿kali)-[~] └─$ sudo nmap -n -Pn -p- --min-rate 5000 -sV -sS -vvv 172.17.0.2 2>/dev/null [sudo] contraseña para kali: Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-27 11:28 CET NSE: Loaded 47 scripts for scanning. Initiating ARP Ping Scan at 11:28 Scanning 172.17.0.2 [1 port] Completed ARP Ping Scan at 11:28, 0.06s elapsed (1 total hosts) Initiating SYN Stealth Scan at 11:28 Scanning 172.17.0.2 [65535 ports] Discovered open port 80/tcp on 172.17.0.2 Discovered open port 139/tcp on 172.17.0.2 Dis...