πβπ¦ΊServices Enumeration
53 - DNS
nmap -T4 -sS -p 53 $IP/24
# Enumerate ALL DNS records! Maybe hidden hosts in network recon
dig -t all target1 target2 target3 @$DNSSERVER
# DNS recon (brute force subdomains):
dnsrecon -d $IP -t brt -D /usr/share/wordlists/dnsmap.txt
dnsenum $DOMAIN
fierce -dns $DOMAIN -wordlist dictionary.txt
# DNS subdomains enum with ffuf
./ffuf -u http://$ip -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.test.lo"Amplification
A Domain Name Server (DNS) amplification attack is a popular form of distributed denial of service (DDoS) that relies on the use of publically accessible open DNS servers to overwhelm a victim system with DNS response traffic.
135,137,138,139 - NetBIOS
139,445 - SMB / SAMBA
RPC over DC
111 - RPC
3268 - DC Enumeration
How to recognize a DC in a windows environment
DC Method 1: Netbios If port 137 (TCP-UDP) open, a DC uses as a netbios suffixes:
For unique names: <1B> Domain Master Browser (PDC)
For group names: <1C> Domain Controllers for a domain
DC Method 2: Global Catalog Service
Use nmap
As a Active Directory Server open ports 3268 and 3269 (SSL) for the Global Catalog Service (LDAP protocol).
Attention: LDAP protocol uses 389 and 636 (SSL).
DC Method #3 From the Windows machine:
DC Method #4
80,8080,443,8000 - HTTP
WebDAV
161 - SNMP
22 - SSH
21 - FTP
25 - SMTP
Detect version
Open Relays
Tests if an SMTP server will accept (via a code 250) an e-mail by using a variation of testing methods
User Enumeration Utility
Allows the enumeration of users: VRFY (confirming the names of valid users) and EXPN (which reveals the actual address of users aliases and lists of e-mail (mailing lists)). Through the implementation of these SMTP commands can reveal a list of valid users. User files contains only Unix usernames so it skips the Microsoft based Email SMTP Server. This can be changed using UNIXONLY option and custom user list can also be provided.
69 - TFTP
88 - KERBEROS
Users enumeration
The script should work against Active Directory. It needs a valid Kerberos REALM in order to operate.
NFS
123 - NTP
389 - LDAP
LDAP-rootdse
ldap-rootdse.nse : Retrieves the LDAP root DSA-specific Entry (DSE)
LDAPsearch
443 - SSL/TLS
check :
1433 - MSSQL
Metasploit modules
Info gathering
MSSQL Ping Utility
Queries the MSSQL instance for information. This will also provide if any ms-sql is running on different ports.
1521 - ORACLE
N.B.
We need 4 things to connect to an Oracle DB.
IP.
Port.
Service Identifier (SID).
Username/ Password.
Detect version
Get SID
Oracle Service Identifier: By querying the TNS Listener directly, brute force for default SIDβs or query other components that may contain it.
Bruteforce
5432 - POSTGRESQL
Detect version
Login utility
Flag injection
6379 - Redis-server
SSDP server
11211 - memcached
9200 - elasticsearch
5353 - avahi-daemon / mDNS
27017,27018,27019,27020 - MongoDB
Last updated
Was this helpful?
