Service Enumeration
FTP - 21
Using hydra
Bruteforcing Credentials
Telnet - 23
NetBios - 137, 138, 139
Ports
137
UDP
NetBIOS Name Service (NBNS)
138
UDP
NetBIOS Datagram Service (NDS)
139
TCP
NetBIOS over TCP/IP (NBT)
Using Nbtstat - Windows
Windows Command Line Utility
Check for local cache
Using nmap
-sV- Version Enumeration-sU- UDP scan
SMB - 139, 445
Server Message Block
Methodology
Look out for
Network File Shares
Logged in User Details
Workgroups
Security Level Information
Domains and Services
Ports
137
UDP
NetBIOS Name Service (NBNS) by SMB
138
UDP
NetBIOS Datagram Service (NDS) by SMB
139
TCP
SMB in conjunction with NetBIOS over TCP/IP (NBT)
445
TCP
Primary Port
Services Examples
netbios-ssn
microsoft-ds
Using enum4linux
Using nmap
To List All Scripts for SMB
To list all scripts by Nmap for SMB enumeration
OS Discovery
Enumerating Shares
Enumerating Users
Enumerating Groups
Enumerating Services
Enumerating Security Level
Exploitation
Unexpected error with integration github-files: Integration is not installed on this space
Using smbclient
smbclient -L- List shares on a machine using NULL Sessionsmbclient -L <target_IP> -U username%password- List shares on a machine using a valid username + passwordsmbclient //<target>/<share$> -U username%password- Connect to a valid share with username + password
RDP - 3389
Methodology
Check for running services on the target and confirm if RDP is running on any open port.
Use Metasploit to confirm the services running is RDP.
Use hydra to brute force the login credentials.
Use RDP tools to login into the victim's machine.
Using Metasploit
Confirming RDP
Using Hydra
Bruteforcing login credentials
Using xfreerdp
Creating RDP session with xfreerdp
SNMP - 161, 162, 10161, 10162
Methodology
Look out for default UDP ports used by SNMP: 161, 162, 10161, 10162.
Identify the processes running on the target machine using nmap scripts.
List valid community strings of the server using nmap scripts.
List valid community strings of the server by using snmp_login Metasploit Module.
List all the interfaces of the machine. Use appropriate nmap Script.
Using snmp-check
Using nmap
Identifying Processes
Identifying Interfaces
Using Metasploit
Identifying Valid Community Strings
Last updated
Was this helpful?