Enumeration
Passive Network Enumeration
#Use Wireshark to captire either ARP or MDNS traffic (GUI)
Intrusionz3r0X@htb[/htb]$ sudo -E wireshark
#Use tcpdump to capture trafic
Intrusionz3r0X@htb[/htb]$ sudo tcpdump -i ens224 -w capture.pcap
#Read the capture.pcap and filter by IP
Intrusionz3r0X@htb[/htb]$ tshark -r capture.pcap -Y "arp" | grep -oP "\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}" | sort -u
#Analyze traffic by using responder (no poisoning)
Intrusionz3r0X@htb[/htb]$ sudo responder -I ens224 -A Active Network Enumeration
#Host Discovery
Intrusionz3r0X@htb[/htb]$ fping -asgq <range>
Intrusionz3r0X@htb[/htb]$ nmap -sn -n <range>
#Host Discovery
C:\> for /L %i in (1 1 254) do ping 172.16.5.%i -n 1 -w 100 | find "Reply"
PS C:\> 1..254 | % {"172.16.5.$($_): $(Test-Connection -count 1 -comp 172.15.5.$($_) -quiet)"}
#DNS enumeration
Intrusionz3r0X@htb[/crto]$ dig cyberbotic.io
Intrusionz3r0X@htb[/crto]$ whois 172.67.205.143
Intrusionz3r0X@htb[/crto]$ ./dnscan.py -d cyberbotic.io -w subdomains-100.txtDefault Writeable Folders
SMB
Mount shared folder on Windows
Mount shared folder on Linux
Manual SMB Enumeration
Create SMB Share on Windows from Commandline
RPCClient
Monitoring for Process On windows
List installed programs
Am I Alone?
Always Install Elevated
Enumerate Remote Privilege Access
Authentication
Network Information
Windows Managment Instrumentation WMI
Net Commands
PowerShell CMDLED
Tools
Bloodhound
Bloodhound Community Edition
Powerview
Users
Groups
Logon and Session
Retrieved Domain SID
Powerfull Powerview Commands
Last updated
