🔢Enumeration Cheatsheet
General Enumeration:
Verbose, syn, all ports, all scripts, no ping
Verbose, SYN Stealth, Version info, and scripts against services.
Nmap script to scan for vulnerable SMB servers – WARNING: unsafe=1 may cause knockover
FTP Enumeration (21):
SSH (22):
SMTP Enumeration (25):
Finger Enumeration (79):
Download script and run it with a wordlist: http://pentestmonkey.net/tools/user-enumeration/finger-user-enum
Web Enumeration (80/443):
dirbuster (GUI)
Pop3 (110):
To login
To list messages
Retrieve message
quits
RPCBind (111):
SMB\RPC Enumeration (139/445):
nbtscan x.x.x.x
Discover Windows / Samba servers on subnet, finds Windows MAC addresses, netbios name and discover client workgroup / domain
List open shares
SNMP Enumeration (161):
Oracle (1521):
Mysql Enumeration (3306):
DNS Zone Transfers:
This one works the best in my experience
Mounting File Share
mounts the share to /mnt/nfs without locking it
Mount Windows CIFS / SMB share on Linux at /mnt/cifs if you remove password it will prompt on the CLI (more secure as it wont end up in bash_history)
Mount a Windows share on Windows from the command line
Install smb4k on Kali, useful Linux GUI for browsing SMB shares
Fingerprinting: Basic versioning / finger printing via displayed banner
Exploit Research
Search exploit-db for exploit, in this example windows 2003 + local esc
Compiling Exploits
Compile C code, add –m32 after ‘gcc’ for compiling 32 bit code on 64 bit Linux
Compile windows .exe on Linux
Packet Inspection:
tcpdump for port 80 on interface eth0, outputs to output.pcap
Last updated
Was this helpful?