Internal Pentest
Scan
Host && Port Scanning
-nflag to decrease time avoiding DNS resoltion.-ffragment packets as FW evasion, if no FW/IDS, remove it.Also check FW evasion
# Ping discovery, Top 20, fragment packets, no DNS resolution
sudo nmap -v --top-ports 20 X.X.X.0/24 -f -n --open -oA
# Ping discovery, Top 200, fragment packets, no DNS resolution, service version
sudo nmap -v --top-ports 200 X.X.X.0/24 -f -n -sV --open -oA
# Top 1000, fragment packets, no DNS resolution, service version, all alive (no ping)
sudo nmap -v --top-ports 1000 X.X.X.0/24 -f -n -sV -Pn --open -oAWeb detection
# httpx
cat ip.txt | httpx -silent -random-agent -status-code -timeout 15 -title -web-server -tech-detect -o httpx.txt
cat ip.txt | httpx -silent -ports <UNCOMMON.PORTS> -random-agent -status-code -timeout 15 -title -web-server -tech-detect -o httpx_uncommon.txtEnum
Check AD section too
AD no credentials
AD with credentials
Enum AD AIO
windapsearch
ldap
rpcclient
cme
Attacks
LLMNR & NBT-NS Poisoning (Responder)
Find a privileged user creds to reuse in other host
Set to
OffSMB and HTTP in/usr/share/responder/Responder.conf
MultiRealy reuses hashes captured in specific host while responder is running
Kerberos
Dumps
AMSI Bypass
Common Exploits
EternalBlue: use auxiliary/scanner/smb/smb_ms17_010
PrivEsc
Local Privilege Escalation
Extra
Oneliners
Native commands
Last updated
Was this helpful?