Services

7 - Echo

nc -uvn <IP> 7
Hello echo    #This is what you send
Hello echo    #This is the response

21 - FTP

Fingerprint

telnet <IP> 21
use auxiliary/scanner/ftp/ftp_version

Anonymous access

ftp <IP>
> anonymous
> anonymous
> ls -ab
> binary
> ascii
> bye

Brute Force

FTP Bounce Port Scanner

Configuration files

  • ftpusers

  • ftp.conf

  • proftpd.conf

22 - SSH

Fingerprint/Enumerate

Brute Force

Configuration files

  • ssh_config

  • sshd_config

  • authorized_keys

  • ssh_known_hosts

  • .shosts

23 - Telnet

Fingerprint

Brute Force

Configuration files

  • /etc/inetd.conf

  • /etc/xinetd.d/telnet

  • /etc/xinetd.d/stelnet

25, 587 - SMTP

Fingerprint / SASL Methods

Enumerate users

Brute Force

Open Mail Relay

53 - DNS

DNS Enumeration

Zones/Zone Transfer

Recursion

DNS Lookup

Reverse DNS Lookup

Brute Force

DNS Amplification Scanner

DNS Non-Recursive Record Scraper

Configuration Files

  • host.conf

  • resolv.conf

  • named.conf

69 - TFTP

Enumeration

Bruteforcing

79 - Finger

User enumeration

Command execution

Finger Bounce

Funny Bit

Weather forecast

80, 8080, 443 - Web Ports

Too much to be listed here: These are not the droids you are looking for.

88 - Kerberos

Enumerate Users

110 - POP3

Enumeration

Brute Force

Retrieve email

111 - Portmapper

Enumerate RPC-based services

RPCBind + NFS

Check for the nfs mounts using port 111

113 - Ident

Enumeration

119 - NNTP Network News Transfer Protocol

Enumeration

Brute Force

123 - NTP

Enumeration

Mode 6 Query

Configuration files

  • ntp.conf

135-139, 445 - NetBIOS

Enumeration

Domain

SMB/Samba shares

Null Session

Connectin with PSExec

Configuration Files

  • Smb.conf

  • lmhosts

135, 593 - Microsoft Windows RPC Services and Microsoft RPC Services over HTTP

Enumeration

161 - SNMP

Enumeration

Available nse scripts:

Default Community Strings

Bruteforce

Configuration files

  • snmp.conf

  • snmpd.conf

  • snmp-config.xml

264 - Check Point FireWall-1 Topology

Enumeration

389, 636 - LDAP

Enumeration

Brute force

Configuration Files

  • General

    • containers.ldif

    • ldap.cfg

    • ldap.conf

    • ldap.xml

    • ldap-config.xml

    • ldap-realm.xml

    • slapd.conf

  • IBM SecureWay V3 server

    • V3.sas.oc

  • Microsoft Active Directory server

    • msadClassesAttrs.ldif

  • Netscape Directory Server 4

    • nsslapd.sas_at.conf

    • nsslapd.sas_oc.conf

  • OpenLDAP directory server

    • slapd.sas_at.conf

    • slapd.sas_oc.conf

  • Sun ONE Directory Server 5.1

    • 75sas.ldif

500/1723 - PPTP/L2TP/VPN

Aggressive mode

Testing process would go as follows:

  • Scan for the IKE service

  • Enumerate transform sets and confirm Aggressive Mode support

  • Run IKEForce in enum mode to obtain a valid group name or ID

  • Obtain a valid hash using IKE-Scan

  • Crack the hash using OCLHashcat

  • Run IKEForce in brute mode to obtain valid XAUTH credentials

  • Authenticate using chosen client

  • Pwn to your heart's content

enumerate id

Test 1

Test 2

502 - Modbus

Discover

512 - rexec

Access

Brute Force

513 - rlogin

Enumeration

Manual Login

Brute force

514 - rsh

Enumeration

Brute force

548 - AFP - Apple Filing Protocol

Enumeration

Brute force

554, 8554 - RTSP

Enumeration

Brute Force

873 - Rsync

Enumeration

1099 - Java RMI

Enumeration

Notable Exploits

Java RMI Server Insecure Default Configuration Java Code Execution

Default configuration of rmiregistry allows loading classes from remote URLs

1433, 1434 - SQL Server

Metasploit

Queries the MSSQL instance for information

Default passwords

Microsoft SQL Server Configuration Enumerator

Microsoft SQL Server xp_cmdshell Command Execution

Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration

Microsoft SQL Server Find and Sample Data

Microsoft SQL Server Generic Query

MSSQL Schema Dump

Others

Hacking SQL Server Stored Procedures

1494 - Citrix

Enumeration

1521 - Oracle

Oracle Enumeration

Brute Force

nmap

odat

metasploit

PrivEsc

Create function:

Create index:

LOGIN WITH NEW USER - VIA RAZORSQL

Start listener on Kali:

Create job:

SQL Injection References

2049 - NFS

Enumeration

no_root_squash

Case 1:

Case 2:

Configuration Files

  • /etc/exports

  • /etc/lib/nfs/xtab

2301, 2381 - Compaq/HP Insight Manager

Enumeration

Configuration Files

  • path.properties

  • mx.log

  • CLIClientConfig.cfg

  • database.props

  • pg_hba.conf

  • jboss-service.xml

  • .namazurc

3260 - ISCSI

Enumeration

Exploitation

3306 - MySQL

Enumeration

Quick testing

Brute Force

Privilege Escalation

Configuration Files

  • windows

    • config.ini

      • my.ini

    • windows\my.ini

    • winnt\my.ini

      • /mysql/data/

  • unix

    • my.cnf

      • /etc/my.cnf

      • /etc/mysql/my.cnf

      • /var/lib/mysql/my.cnf

      • ~/.my.cnf

      • /etc/my.cnf

  • Command History

    • ~/.mysql.history

  • Log Files

    • connections.log

    • update.log

    • common.log

3389 - RDesktop

Network level auth NLA

Brute Force

5000+ - Sybase

Enumeration

5060 - SIP

Enumeration

Configuration Files

  • SIPDefault.cnf

  • asterisk.conf

  • sip.conf

  • phone.conf

  • sip_notify.conf

  • .cfg

  • 000000000000.cfg

  • phone1.cfg

  • sip.cfg etc. etc.

5432 - Postgresql

Enumeration

Brute Force

Exploitation

PostgreSQL 9.0, 9.1, and 9.2

5555 - HPDataProtector

RCE

5900^ - VNC

Enumeration

Brute Force

Password Attacks

Default location where the VNC password is stored

Configuration Files

  • .vnc

  • /etc/vnc/config

  • $HOME/.vnc/config

  • /etc/sysconfig/vncservers

  • /etc/vnc.conf

5984 - CouchDB

Enumeration

6000^ - X11

Enumeration

Screenshots

If image is black, kill screensaver:

Keyboard Command Injection

Manual

Metasploit

Sniff the keyboard keystrokes

Configuration Files

  • /etc/Xn.hosts

  • /usr/lib/X11/xdm

  • Search through all files for the command "xhost +" or "/usr/bin/X11/xhost +"

  • /usr/lib/X11/xdm/xsession

  • /usr/lib/X11/xdm/xsession-remote

  • /usr/lib/X11/xdm/xsession.0

  • /usr/lib/X11/xdm/xdm-config

  • DisplayManager*authorize:on

6379 - Redis

Enumeration

Exploitation

9001, 9030 - Tor

Enumeration

9100 - PJL - Jet Direct

Enumeration

9160 - Apache Cassandra

Enumeration

Brute Force

10000 - NDMP -Network Data Management Protocol

Enumeration

11211 - Memcache

Enumeration

27017, 27018 - MongoDB

Enumeration

Brute Force

44818 - EthernetIP-TCP-UDP

Enumeration

47808 - UDP BACNet

Enumeration

Last updated

Was this helpful?