Network
Nmap
Scan Popular Port
nmap --top-ports 5000 ipFast scan
nmap -T4 -F ip
nmap -sV -T4 -O -F -A --version-light ipScan all port
nmap -p- -T4 -v ipScan With Script & Version
nmap -A -T4 -sC -sV ip Scan All Local
nmap 192.168.1.1/24 -sn -T4 ipScan with scripts
nmap -sC ip
nmap --script "default,discovery,exploit,version,vuln" ip
nmap --script "default,discovery,exploit,version,vuln,servicetags,ntp-monlist,dns-recursion,snmp-sysdescr" ipScan udp
sudo nmap -sU -T4 ip
sudo nmap -sUV -T4 -F --version-intensity 0 ip
sudo nmap -sU -A -PN -n -pU:19,53,123,161 -script=ntp-monlist,dns-recursion,snmp-sysdescr ip
sudo nmap -sU -pU:19,53,123,161 -Pn -n --max-retries=0 ipScan SCTP
nmap -T4 -sY -n --open -Pn ipHardcore scan
sudo nmap -sS -sU -p- -PN -O -sV -sC --allports --version-all -T4 ip -vvDNS
Port: 53
Domain Name System (DNS) is the hierarchical and distributed naming system used to identify computers reachable through the Internet. These are most commonly used to map human-friendly domain names to the numerical IP addresses computers need to locate services.
Any Information
dig ANY @dns_ip domainInformation
dig TXT @dns_ip domainTranfert Zone
dig axfr @dns_ip domainReverse Lookup
dig -x ip @dns_ipReverse All Address
dnsrecon -r 127.0.0.0/24 -n ip_dnsSNMP
Port: 161 / 162
SNMP is used to monitor the network, detect network faults, and sometimes even used to configure remote devices.
List devices
snmp-check ipRPCBind
The rpcbind utility maps RPC services to the ports on which they listen. RPC processes notify rpcbind when they start, registering the ports they are listening on and the RPC program numbers they expect to serve. - redhat
Port: 111
Info
rpcinfo -p ipNFS
A Network File System (NFS) allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. - redhat
Port: 2049
To bypass permission change your uid
Show NFS
showmount -e squashed.htbMount
mount -t nfs squashed.htb:/ nsf_mount -o nolockScan Local Network
ARP Scannner Tools shows every active IPv4 device on your Subnet. Since ARP is non-routable, this type of scanner only works on the local LAN.
Address Resolution Protocol (ARP) is the Dynamic mapping technique used to map the logical address (IP) to a physical address (MAC).
Arp
sudo arp
Address HWtype HWaddress Flags Mask Iface
NameHost ether xx:xx:xx:xx:xx:xx C INTRFCNetdiscover
netdiscoverArp-scan
arp-scan -lList opened port localy
SS
ss -lntuNetstat
netstat -tulpnHydra
Proxy
export HYDRA_PROXY=connect://localhost:8080Basic HTTP Auth
hydra -C wordlist.txt SERVER_IP -s PORT http-get /Post HTTP Login
hydra -l admin -P wordlist.txt -f ip -s port http-post-form "/login.php:username=^USER^&password=^PASS^:F=<form name='login'"SSH
hydra -L user.txt -P pass.txt -u -f -t 4 ssh://ip:portFTP
hydra -l m.gates -P /usr/share/wordlists/rockyou.txt ftp://127.0.0.1Packet Analyzer
Wireshark
Run
sudo wiresharkGet all Files
File > Export Object > HTTP
Rigth Click On request > Follow > TCP
Filters
smb || smb2 || http || tcp ||ip.src == 1.1.1.1 && ip.dst == 1.1.1.1 && tcp.port == 80TCPflow
Export File of pcap
tcpflow -r capture.pcapTcpdump
Basic
sudo tcpdump -i anyMax Argument
sudo tcpdump -i any -c <MAX_PACKETS> host 192.168.1.1 '&&' port 80 '&&' src 1.1.1.1Print HTTP content
sudo tcpdump -i any -c10 -nn -A port 80Save
sudo tcpdump -i any -w file.pcapPython
from scapy.all import *
scapy_cap = rdpcap('file.pcap')
i = 0
for packet in scapy_cap:
if type(packet[TCP].payload) == scapy.packet.Raw:
try:
print(i, ':', packet[TCP].payload.load.decode())
except:
print(i, ':', packet[TCP].payload.load)
i += 1Last updated