Enumeration
Good Enumeration Guides:
FTP
ncFTP:
SSH
Tutorial from g0tmi1k
SMTP
SMTP is a server to server service. The user receives or sends emails using IMAP or POP3. Those messages are then routed to the SMTP-server which communicates the email to another server. The SMTP-server has a database with all emails that can receive or send emails. We can use SMTP to query that database for possible email-addresses. Notice that we cannot retrieve any emails from SMTP. We can only send emails.
We can manually try to find out which usernames are in the database. This can be done in the following way.
Here we have managed to identify the user root. But roooooot was rejected. VRFY, EXPN and RCPT can be used to identify users. Telnet is a bit more friendly some times. So always use that too
Using nmap to automate the enumeration of users.
Using SMTP for log contamination. Watch the video from ippsec on Beep
HTTP
Check ippsec video on Shocker
Shellshock
Nikto
Gobuster
WordPress Scanner
WebDAV Scanner
HTTPS
POP3
RPC
SMB
Enumeration and vulnerability scanning with nmap. Add your target IP address after pasting the command in your terminal.
Using smbmap
Using smbclient
Mount the smb share
Check smb file sharing
crackmapexec
NFS
SNMP
MySQL
SQL Server
Reference: https://pentestlab.blog/category/exploitation-techniques/
DNS
Important DNS records:
Telnet
RDP
LDAP
Kerberos
Good references on kerberos exploitation:
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
Last updated