Perform #NetBios Enumeration Using Windows Command-Line Utilizes
objective : attack 2019 Machine to target window 11 machine Open command prompt (administrator)
ntstat -a 10.10.1.11
output :// netbios remote machine name Table is displayed
netstat -c
// netbios remote cache name table
Connect to parrot connect to terminal and do SU
snmpwalk -v1 -c public 10.10.1.22
// list object identifier and other variable
snmpwalk -v2c -c public 10.10.1.22
// perform v2 enumeration, data transisted from agent to smtp server
Windows 2019 Machine,
- Open ==
Active Directory Explorer
== from CEH-Tool shared drive on machine - Connect to : 10.10.1.22
- Click OK Displays Active directory structure
- Click CN=Users
- Select user in list and
- Right click and Modify Attribute:
- and Select the Value of attribute (example : jason to mukesh)
Setup -Prerequsite Window 2019 Machine
- Open Server manager
- Add roles and features
- In Server roles :
- Select
Server for NFS
- Select
- Next , Next and Install Test Workstation: Parrot machine Open Terminal
sudo su
cd /home attacker
nmap -p 2049 10.10.1.19
// confirm that nfs is running on server 10.10.1.19
locate superEnum
cd /home/attacker/SuperEnum
echo "10.10.1.19" >> Target.txt
//
./supernum
`Enter the file name with IP`
cd /home/attacker/RPCScan
python3 rpc-scan.py 10.10.1.19 --rpc
//
LAB 05_TASK 01 : Perform DNs Enumeration using Zone Transfer with #dig on linux and #nslookup on windows
Workstation : Parrot Open Terminal cd /home/attacker
cd /home/attacker
dig ns www.certifiedhacker.com
dig @ns1.bluehost.com www.certifiedhacker.com axfr
// if it is configured correction to not allow transfer , it will fail. else attack can pass
Workstation : Windows 11 Open Terminal
nslookup
> set querytype=SOA
> ls -dns1.bluehost.com
Workstation : Parrot Open Terminal
cd /home/attacker
nmap -p 25 --script=smtp-enum-users 10.10.1.19
// list user available with SMTP
nmap -p 25 --script=smtp-open-relay 10.10.1.19
// display list of open relay , if no output means no relay available
nmap -p 25 --script=smtp-command 10.10.1.19
// display port/status and available command with the smtp target
Workstation : Windows 11 Utility : Global Network Inventory
- New Audit Wizard
- Select
Single Address scan
- Enter
10.10.1.22
- Next
- Connect as : Domain \Username : Administator , password :
Pa$$w0rd
- Next
- Finish
It will start SCAN and status displayed in Scan Progress
Select computer from scan result tree and see summary and other inventory
- Login windows 11
- cwe.mitre.org
- Search tab: Search "SMB"
- From search results Select " CWE 552 - Files or Directories Accessible to External Parties"
- and also open CWE List :
- View CWE List : Weakness in the 2022 CWE ....
- with similar steps search vulnerabilities and do needful research
Workstation: Parrot OS
- Open
Pentesting
-->Vulnerability Analysis
-->Openvas Greenbone
- Tool will initializae and portal will be served at http://127.0.0.1:9392
- Login with Admin/password
- Add
Target Machines
and scan with and without the firewall state - Scan the machines , if the reports are similar means that the systems are vulnerable
Note: Use CeHv12 Resource for