Standalone Methodology
(In-Progress) Workflow
Initial Enumeration
Nmap scan
nmap -sC -sV -Pn <IP>
nmap -sC -sV -Pn -oN <OUTPUT FILE> <IP>
nmap -sC -sV -p 1-65535 -Pn -oN <OUTPUT FILE> <IP> # Only run this if completely stuck
sudo nmap -sU -Pn <IP>
sudo nmap -sU -Pn -oN <OUTPUT FILE> <IP>Enumeration for Windows Machine (MUST RUN IF TARGET IS WINDOWS)
enum4linux -a <IP>
enum4linux -a -u 'guest' -p '' <IP>
enum4linux -a -u <USERNAME> -p <PASSWORD> <IP>Adding to host files
echo "<IP> <HOSTNAME>" | sudo tee -a /etc/hostsSMB (TCP Port 139,445)
Share Permission Enumeration
Connection to shares
SMB Vulnerabilty Scan
Enumerating users by bruteforcing RID
LDAP
Enumeration LDAP with Null Credentials
Probing LDAP Further
FTP (TCP Port 21)
Anonymous Login
Brute Force
Nmap script enumeration
Vulnerability scanning
Enumeration of users
Command
Configuration files to look out
Vulnerable versions
SSH (TCP Port 22)
User enumeration
Connection
Brute Force
Path of id_rsa
Cracking id_rsa
Configuration files
SMTP (TCP Port 25)
User enumeration
Brute-force
To check if user exists
Check if user belongs to mailing list
Enumeration and vulnerability scanning
RDP (TCP Port 3389)
Nmap scripts
Brute-force
POP3 (TCP Port 110)
Connecting to the service
Command
MySQL (TCP Port 3306)
Nmap Scanning
User Defined Functions
Credential Guessing
Username Enumeration
Connection
MySQL server configuration file names
Unix
Windows
Log Files
Command History
Finding passwords to MySQL
Getting all the information from inside the database
SNMP (UDP Port 161)
Enumerate Community strings
Nmap scripts
snmpwalk
SNMPv3 enumeration
Wordlist
SNMP MIB Trees
Formatting JSON output
Last updated