No Null shares.
smbclient --no-pass -L //192.168.143.125
do_connect: Connection to 192.168.143.125 failed (Error NT_STATUS_IO_TIMEOUT)
╭─ /home/kali ▓▒░─────────────────────────────────────────────────────────────░▒▓ 1 ✘ 5s root@kali
╰─ smbmap -H 192.168.143.125
[!] 445 not open on 192.168.143.125....
╭─ /home/kali ▓▒░───────────────────────────────────────────────────────────────────────░▒▓ ✔ root@kali
╰─ smbmap -H 192.168.143.125 -p12445
[!] 445 not open on 192.168.143.125....
╭─ /home/kali ▓▒░───────────────────────────────────────────────────────────────────────░▒▓ ✔ root@kali
╰─ smbmap -H 192.168.143.125 -P 12445
[!] RPC Authentication error occurred
[!] Authentication error on 192.168.143.125
╭─ /home/kali ▓▒░──────────────────────────────────────────────────────────────░▒▓ ✔ 13s root@kali
╰─
Samba 3.5.0 < 4.4.14/4.5.10/4.6.4 - 'is_known_pipename()' Arbitrary Module Load (M | linux/remote/42084.rb
The exploit did not work for the time being.