Enumeration

Good Enumeration Guides:

FTP

ncFTP:

SSH

Tutorial from g0tmi1k

SMTP

SMTP is a server to server service. The user receives or sends emails using IMAP or POP3. Those messages are then routed to the SMTP-server which communicates the email to another server. The SMTP-server has a database with all emails that can receive or send emails. We can use SMTP to query that database for possible email-addresses. Notice that we cannot retrieve any emails from SMTP. We can only send emails.

We can manually try to find out which usernames are in the database. This can be done in the following way.

Here we have managed to identify the user root. But roooooot was rejected. VRFY, EXPN and RCPT can be used to identify users. Telnet is a bit more friendly some times. So always use that too

Using nmap to automate the enumeration of users.

Using SMTP for log contamination. Watch the video from ippsec on Beep

HTTP

Check ippsec video on Shocker

Shellshock

Nikto

Gobuster

WordPress Scanner

WebDAV Scanner

HTTPS

POP3

RPC

SMB

Enumeration and vulnerability scanning with nmap. Add your target IP address after pasting the command in your terminal.

Using smbmap

Using smbclient

Mount the smb share

Check smb file sharing

crackmapexec

NFS

SNMP

MySQL

SQL Server

Reference: https://pentestlab.blog/category/exploitation-techniques/

DNS

Important DNS records:

Telnet

RDP

LDAP

Kerberos

Good references on kerberos exploitation:

https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a

https://www.tarlogic.com/en/blog/how-to-attack-kerberos/

Last updated