🔢Enumeration Cheatsheet

General Enumeration:

  • nmap -vv -Pn -A -sC -sS -T 4 -p- 10.0.0.1
    • Verbose, syn, all ports, all scripts, no ping

  • nmap -v -sS -A -T4 x.x.x.x
    • Verbose, SYN Stealth, Version info, and scripts against services.

  • nmap –script smb-check-vulns.nse –script-args=unsafe=1 -p445 [host]
    • Nmap script to scan for vulnerable SMB servers – WARNING: unsafe=1 may cause knockover

  • netdiscover -r 192.168.1.0/24

FTP Enumeration (21):

  • nmap –script ftp-anon,ftp-bounce,ftp-libopie,ftp-proftpd-backdoor,ftp-vsftpd-backdoor,ftp-vuln-cve2010-4221,tftp-enum -p 21 10.0.0.1

SSH (22):

  • ssh INSERTIPADDRESS 22

SMTP Enumeration (25):

  • nmap –script smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-cve2011-1720,smtp-vuln-cve2011-1764 -p 25 10.0.0.1
  • nc -nvv INSERTIPADDRESS 25
  • telnet INSERTIPADDRESS 25

Finger Enumeration (79):

Download script and run it with a wordlist: http://pentestmonkey.net/tools/user-enumeration/finger-user-enum

Web Enumeration (80/443):

  • dirbuster (GUI)

Pop3 (110):

    • To login

    • To list messages

    • Retrieve message

    • quits

RPCBind (111):

SMB\RPC Enumeration (139/445):

  • nbtscan x.x.x.x

    • Discover Windows / Samba servers on subnet, finds Windows MAC addresses, netbios name and discover client workgroup / domain

    • List open shares

SNMP Enumeration (161):

Oracle (1521):

Mysql Enumeration (3306):

DNS Zone Transfers:

    • This one works the best in my experience

Mounting File Share

    • mounts the share to /mnt/nfs without locking it

    • Mount Windows CIFS / SMB share on Linux at /mnt/cifs if you remove password it will prompt on the CLI (more secure as it wont end up in bash_history)

    • Mount a Windows share on Windows from the command line

    • Install smb4k on Kali, useful Linux GUI for browsing SMB shares

Fingerprinting: Basic versioning / finger printing via displayed banner

Exploit Research

    • Search exploit-db for exploit, in this example windows 2003 + local esc

Compiling Exploits

    • Compile C code, add –m32 after ‘gcc’ for compiling 32 bit code on 64 bit Linux

    • Compile windows .exe on Linux

Packet Inspection:

    • tcpdump for port 80 on interface eth0, outputs to output.pcap

Last updated

Was this helpful?