Scanning & Enumeration
π‘ the most important rule here is to search all your findings like searching for exploits or any data related to the version of services u received and take note of every thing u see
Web App(HTTP/s) Enum
Take a look at Web_Recon
scan the website with nmap and identify the ports and services
Run nikto to automate vuln scanning
try to fuzz the WebApp using dirbuster or any tool else
spike the webapp and see the source code
SMB & NetBios Enum
refers to a technique used to gather information about the network shares, users, and groups of a target system that uses the SMB protocol.
SMB Protocol works on TCP port number 445, NetBios Protocol works on Ports
(udp137 nameservice , udp138 datagram service, tcp139 sessions)
EternalBlue is an exploit that targets SMBv1 and allows for remote code execution on a victim machine. It was famously used in the WannaCry ransomware attack in 2017, and is a powerful tool for attackers looking to gain access to a network. It is important to ensure that SMBv1 is disabled on all machines to prevent this vulnerability from being exploited.
in order to make a prober scan first we need to know which Hosts have the NetBios service
we can know the machines that use the NetBIOS service in a network by nbtscan tool using this command:
second we can see what we can access throw this service on every host, we can use smbclient to connect as a client by writting this command:
we can add credintials like user and pass we want login with by -u but the credits have to be clear txt form
and thereβs another tool that can do same job but u can pass the credits hashed, itβs called smbmap we can use it by:
thereβs another powerfull tool for enum part, itβs called enum4linux
and last but not least we can use the most popular tool which is nmap, we will use it with itβs scripts
feature to enum, exploit the smb service by :
using exploits scripts:
Network file system(NFS) Enum
The Network File System (NFS) enum is a process of enumerating NFS shares on a remote server. It is a technique used in penetration testing to gather information and potentially gain unauthorized access, it works on port number 111
in the last topic in smb,netbios services enum we were able to view or access the files of the other hosts here is the same but we can mount these files to our machine
in order to enum the NFS service we will look for the port 111 open
thereβs a lot of option like using nmap
and we can use NSE with it to get extra info like:
another option using rpcinfo:
so know we are sure that thereβs rpc and nfs , the next step to find any files we can access
using showmount:
the system will list for the files u can access in our case we can access the whole system since the output is anything under the root /* as shown below
to mount the files in our machine we will start the rpc service :
then start the mount :
SMTP Enum
SMTP enum is a technique used for enumerating or discovering email addresses on a mail server. It involves sending specific commands to the Simple Mail Transfer Protocol (SMTP) server to obtain information about valid email addresses on the domain, smtp works on port number 25
we can VRFY the users that exists on the mail server but this a manual method and non-realistic so the best way is to write a script for it using python3
we can modify it to bruteforcing users from a txt file
or by using smtp-user-enum:
the output says 0 results because Iβve a problem with my metasploitable machine the response takes too long to response until it gets timed out message , the tool consider not responding as the user doesnβt exist
SNMP Enum
SNMP (Simple Network Management Protocol) is a protocol used for network management and monitoring. It allows network devices to be managed and monitored from a central location using standardized messages and commands.
SNMP enum is a type of network reconnaissance tool that is used to enumerate information from target devices using Simple Network Management Protocol (SNMP) it works on port number udp 161 .
we can use snmpwalk:
we can use metasploit
Last updated