Enumeration
Quick reference for common port enumeration:
SMB
smbmap -u '' -p '' -R -H 192.168.249.64
smbclient -N -L //10.10.10.172
smb: \> recurse
smb: \> prompt off
smb: \> mget *
If you see anonymous, check permissions of anonymous user
└─$ smbmap -u anonymous -H 10.10.9.155
Change Password:
└─$ smbpasswd -r 10.10.10.193 -U bhult
SNMP
snmpwalk -c public -v1 192.168.232.149 1.3.6.1.4.1.1452.1.2.5.1.3.21.1.4.7 -Oa
└─$ snmpwalk -v 2c -c public 192.168.232.149 NET-SNMP-EXTEND-MIB::nsExtendOutputFull
└─$ snmpwalk -v 2c -c public 192.168.232.149 NET-SNMP-EXTEND-MIB::nsExtendObjects
snmp-check 192.168.200.42
SNMP port is open, think snmpwalk
└─$ snmpwalk -v 2c -c public 10.10.10.116
[[161 - SNMP]]
Enumerate community strings on v1 and v2
sudo nmap -sU -p 161 --script snmp-brute 192.168.194.149
Try to get useful information from accessible communities
snmpwalk -v 1 -c public 192.168.194.149 NET-SNMP-EXTEND-MIB::nsExtendObjects
snmpwalk -v2c -c public 192.168.194.149 | grep <string>
Enum4Linux
Enumerate users in AD:
└─$ enum4linux -U 10.129.164.218 | grep 'user:' | sed 's/user:\[//g' | sed 's/\]//g'
enum4linux -U 10.10.10.161 | grep 'user:' | sed 's/user:\[//g' | sed 's/\]//g' | awk '{print $1}' | tee users.txt
└─$ enum4linux -u 'Alexander.knight@gmail.com' -p 'al;ksdhfewoiuh' -a 10.10.11.16
VNC Passwd decode
└─$ git clone https://github.com/trinitronx/vncpasswd.py.git
└─$ cd vncpasswd.py
└─$ python2 ./vncpasswd.py -d -H 6bcf2a4b6e5aca0f
Decode VNC password using vncpasswd.py
https://github.com/trinitronx/vncpasswd.py/blob/master/vncpasswd.py
Then login via evil-winrm