πŸ•β€πŸ¦ΊServices Enumeration

53 - DNS

nmap -T4 -sS -p 53 $IP/24

# Enumerate ALL DNS records! Maybe hidden hosts in network recon

dig -t all target1 target2 target3 @$DNSSERVER

# DNS recon (brute force subdomains):
dnsrecon -d $IP -t brt -D /usr/share/wordlists/dnsmap.txt

dnsenum $DOMAIN

fierce -dns $DOMAIN -wordlist dictionary.txt

# DNS subdomains enum with ffuf
./ffuf -u http://$ip -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.test.lo"
Wordlists

Amplification

A Domain Name Server (DNS) amplification attack is a popular form of distributed denial of service (DDoS) that relies on the use of publically accessible open DNS servers to overwhelm a victim system with DNS response traffic.

135,137,138,139 - NetBIOS

139,445 - SMB / SAMBA

RPC over DC

111 - RPC

3268 - DC Enumeration

How to recognize a DC in a windows environment

  • DC Method 1: Netbios If port 137 (TCP-UDP) open, a DC uses as a netbios suffixes:

    • For unique names: <1B> Domain Master Browser (PDC)

    • For group names: <1C> Domain Controllers for a domain

  • DC Method 2: Global Catalog Service

    • Use nmap

    • As a Active Directory Server open ports 3268 and 3269 (SSL) for the Global Catalog Service (LDAP protocol).

    • Attention: LDAP protocol uses 389 and 636 (SSL).

  • DC Method #3 From the Windows machine:

  • DC Method #4

80,8080,443,8000 - HTTP

WebDAV

161 - SNMP

22 - SSH

21 - FTP

25 - SMTP

Detect version

Open Relays

Tests if an SMTP server will accept (via a code 250) an e-mail by using a variation of testing methods

User Enumeration Utility

Allows the enumeration of users: VRFY (confirming the names of valid users) and EXPN (which reveals the actual address of users aliases and lists of e-mail (mailing lists)). Through the implementation of these SMTP commands can reveal a list of valid users. User files contains only Unix usernames so it skips the Microsoft based Email SMTP Server. This can be changed using UNIXONLY option and custom user list can also be provided.

69 - TFTP

88 - KERBEROS

Users enumeration

The script should work against Active Directory. It needs a valid Kerberos REALM in order to operate.

NFS

123 - NTP

389 - LDAP

LDAP-rootdse

ldap-rootdse.nse : Retrieves the LDAP root DSA-specific Entry (DSE)

LDAPsearch

443 - SSL/TLS

check :

1433 - MSSQL

Metasploit modules

Info gathering

MSSQL Ping Utility

Queries the MSSQL instance for information. This will also provide if any ms-sql is running on different ports.

1521 - ORACLE

N.B.

We need 4 things to connect to an Oracle DB.

  • IP.

  • Port.

  • Service Identifier (SID).

  • Username/ Password.

Detect version

Get SID

Oracle Service Identifier: By querying the TNS Listener directly, brute force for default SID’s or query other components that may contain it.

Bruteforce

5432 - POSTGRESQL

Detect version

Login utility

Flag injection

6379 - Redis-server

SSDP server

11211 - memcached

9200 - elasticsearch

5353 - avahi-daemon / mDNS

27017,27018,27019,27020 - MongoDB

Last updated

Was this helpful?