|

Enumeration:
-
Daytime port 13 open
-
FTP port 21 open
-
SSH port 22 open
-
Telnet port 23 open
-
Sendmail Port 25 open
-
DNS port 53 open
-
TFTP port 69 open
-
1. TFTP Enumeration
-
tftp ip_address PUT local_file
-
tftp ip_address GET conf.txt (or other files)
-
Solarwinds TFTP server
-
tftp – i <IP> GET /etc/passwd (old Solaris)
-
2. TFTP Bruteforcing
-
Finger Port 79 open
-
1. User enumeration
-
2. Command execution
-
3. Finger Bounce
-
Web Ports 80,8080 etc. open
-
1. Fingerprint server
-
Telnet ip_address port
-
Firefox plugins
-
2. Crawl website
-
3. Web Directory enumeration
-
4. Vulnerability Assessment
-
5. Proxy Testing
-
6. Examine configuration files
-
Generic
-
-
Joomla
-
configuration.php
-
diagnostics.php
-
joomla.inc.php
-
config.inc.php
-
Mambo
-
configuration.php
-
config.inc.php
-
Wordpress
-
setup-config.php
-
wp-config.php
-
-
/WAN.html (contains PPPoE ISP password)
-
/WLAN_General.html and /WLAN.html (contains WEP key)
-
/rpDyDNS.html (contains DDNS credentials)
-
/Firewall_DefPolicy.html (Firewall)
-
/CF_Keyword.html (Content Filter)
-
/RemMagWWW.html (Remote MGMT)
-
/rpSysAdmin.html (System)
-
/LAN_IP.html (LAN)
-
/NAT_General.html (NAT)
-
/ViewLog.html (Logs)
-
/rpFWUpload.html (Tools)
-
/DiagGeneral.html (Diagnostic)
-
/RemMagSNMP.html (SNMP Passwords)
-
/LAN_ClientList.html (Current DHCP Leases)
-
Config Backups
-
7. Examine web server logs
-
References
-
Exploit Frameworks
-
Portmapper port 111 open
-
NTP Port 123 open
-
NetBIOS Ports 135-139,445 open
-
SNMP port 161 open
-
LDAP Port 389 Open
-
PPTP/L2TP/VPN port 500/1723 open
-
Enumeration
-
Brute-Force
-
Reference Material
-
Modbus port 502 open
-
rlogin port 513 open
-
Rlogin Enumeration
-
Find the files
-
find / -name .rhosts
-
locate .rhosts
-
Examine Files
-
Manual Login
-
Subvert the files
-
Rlogin Brute force
-
rsh port 514 open
-
1. Rsh Enumeration
-
2. Rsh Brute Force
-
SQL Server Port 1433 1434 open
-
1. SQL Enumeration
-
2. SQL Brute Force
-
Citrix port 1494 open
-
1. Citrix Enumeration
-
Default Domain
-
Published Applications
-
2. Citrix Brute Force
-
Oracle Port 1521 Open
-
NFS Port 2049 open
-
Compaq/HP Insight Manager Port 2301,2381open
-
MySQL port 3306 open
-
Enumeration
-
nmap -A -n -p3306 <IP Address>
-
nmap -A -n -PN --script:ALL -p3306 <IP Address>
-
telnet IP_Address 3306
-
use test; select * from test;
-
To check for other DB's -- show databases
-
Administration
-
Manual Checks
-
SQL injection
-
References.
-
RDesktop port 3389 open
-
1. Rdesktop Enumeration
-
2. Rdestop Bruteforce
-
Sybase Port 5000+ open
-
SIP Port 5060 open
-
1. SIP Enumeration
-
2. SIP Packet Crafting etc.
-
-
Tracing paths: - sipsak -T -s sip:usernaem@domain
-
Options request:- sipsak -vv -s sip:username@domain
-
Query registered bindings:- sipsak -I -C empty -a password -s sip:username@domain
-
-
3. SIP Vulnerability Scanning/ Brute Force
-
4. Examine Configuration Files
-
SIPDefault.cnf
-
asterisk.conf
-
sip.conf
-
phone.conf
-
sip_notify.conf
-
<Ethernet address>.cfg
-
000000000000.cfg
-
phone1.cfg
-
sip.cfg etc. etc.
-
VNC port 5900^ open
-
X11 port 6000^ open
-
Tor Port 9001, 9030 open
-
Tor Node Checker
-
nmap NSE script
-
Jet Direct 9100 open
|
|
|