Enumeration
Enumeration phase tools. Fuzzing, Discovery, ...
Wordlists
Subdomain enumeration: /Discovery/DNS (subdomain*)
Pages, Extensions, Directory, Parameters: /Discovery/Web-Content (directory-list*.txt, web-extensions.txt, burp-parameter-names.txt)
LFI wordlist: /Fuzzing/LFI
Crunch Word list generator
Port mapping
Nmap
Flag | Description |
---|---|
| Run scripts |
| Version scan |
| Specify ports. Can be a list, can contain ranges |
| Scan all 65535 ports |
| Run a specific script from |
| Enable OS detection, version detection, script scanning, and traceroute (Loud) |
| Show only open ports |
| Save in all output formats with prefix of |
| Disables port scanning |
| Scans a list of hosts from a file |
| Displays the reason for specific result. |
| Shows all packets sent and received |
| Fast Scan. Top 100 ports |
| Scans the specified top ports that have been defined as most frequent. |
| Disable DNS resolution |
| Disables ARP ping. |
| Shows status every 5 seconds |
| Verbositiy level, increasing |
| Performs service detection, OS detection, traceroute and uses defaults scripts to scan the target. |
| Speed optimization parameter |
| Aggressiveness |
| Performs the scans from specified source port. |
| Update scripts DB |
Some useful nmap scripts (/usr/share/nmap/scripts/
):
smb-os-discovery.nse (usually on
-p 445
)http-enum (example on port
-p 80
)
Some nmap usages examples:
-p 21 --packet-trace -Pn -n --disable-arp-ping
to scan port 21 and get a detailed information for the packet as the answer
Scan types
Flag | Description |
---|---|
| Performs the ping scan by using 'ICMP Echo requests' against the target.
Usually in combination with |
| (Default as Root) SYN Scan |
| (Default as non-Root) TCP Scan |
| Performs a UDP scan. |
| Performs a service scan. |
| TCP ACK scan (hard to filter) |
| Disable the ICMP echo requests (avoid checking if host is alive) |
Types of ports states
| This indicates that the connection to the scanned port has been established. These connections can be TCP connections, UDP datagrams as well as SCTP associations. |
| When the port is shown as closed, the TCP protocol indicates that the packet we received back contains an |
| Nmap cannot correctly identify whether the scanned port is open or closed because either no response is returned from the target for the port or we get an error code from the target. |
| This state of a port only occurs during the TCP-ACK scan and means that the port is accessible, but it cannot be determined whether it is open or closed. |
| If we do not get a response for a specific port, |
| This state only occurs in the IP ID idle scans and indicates that it was impossible to determine if the scanned port is closed or filtered by a firewall. |
XML (-oX
) output to HTML tool: xsltproc
Fuzzing
Ffuf
Typical Usage
Recursive search
File extension
Setting and/or fuzz headers (example: VHosts)
Filter or Match
Example: Filter (remove) by response size anything of size 600
HTTP Verb
Data
Ignore comments
Colorize output
Output to file
PHP Config file defualt positions
X.Y
is the php version
Nginx: /etc/php/X.Y/fpm/php.ini
Apache: /etc/php/X.Y/apache2/php.ini
SNMP
Simple Networking Management Protocol
Can provide information such as process parameters, routing information, versions and services bound to interfaces
snmpwalk
is used to interact with it
Example:
snmpwalk -v 2c -c public 10.129.42.253 1.3.6.1.2.1.1.5.0
onesixtyone can bruteforce the community string names
Example with included bruteforce file:
onesixtyone -c dict.txt 10.129.42.254
Gobuster
DNS, vhost, and directory brute-forcing
Directory mode
gobuster dir
option
Flag | Description |
---|---|
-u <URL> | Defines the target URL |
-w <path_to_wordlist> | Defines the wordlist |
DNS mode
Flag | Description |
---|---|
-d <domain> | Defines the target domain |
-w <path_to_wordlist> | Defines the wordlist (example: |
FTP
If it has SSL we can use openssl to connect:
Custom Wordlist Generation (CeWL)
Others
Webserver banner: Find in header, can use
curl -IL
Whatweb: handy tool and contains much functionality to automate web application enumeration
Last updated