Services
7 - Echo
nc -uvn <IP> 7
Hello echo #This is what you send
Hello echo #This is the response21 - FTP
Fingerprint
telnet <IP> 21use auxiliary/scanner/ftp/ftp_versionAnonymous access
ftp <IP>
> anonymous
> anonymous
> ls -ab
> binary
> ascii
> byeBrute Force
FTP Bounce Port Scanner
Configuration files
ftpusers
ftp.conf
proftpd.conf
22 - SSH
Fingerprint/Enumerate
Brute Force
Configuration files
ssh_config
sshd_config
authorized_keys
ssh_known_hosts
.shosts
23 - Telnet
Fingerprint
Brute Force
Configuration files
/etc/inetd.conf
/etc/xinetd.d/telnet
/etc/xinetd.d/stelnet
25, 587 - SMTP
Fingerprint / SASL Methods
Enumerate users
Brute Force
Open Mail Relay
53 - DNS
DNS Enumeration
Zones/Zone Transfer
Recursion
DNS Lookup
Reverse DNS Lookup
Brute Force
DNS Amplification Scanner
DNS Non-Recursive Record Scraper
Configuration Files
host.conf
resolv.conf
named.conf
69 - TFTP
Enumeration
Bruteforcing
79 - Finger
User enumeration
Command execution
Finger Bounce
Funny Bit
Weather forecast
80, 8080, 443 - Web Ports
Too much to be listed here: These are not the droids you are looking for.
88 - Kerberos
Enumerate Users
110 - POP3
Enumeration
Brute Force
Retrieve email
111 - Portmapper
Enumerate RPC-based services
RPCBind + NFS
Check for the nfs mounts using port 111
113 - Ident
Enumeration
119 - NNTP Network News Transfer Protocol
Enumeration
Brute Force
123 - NTP
Enumeration
Mode 6 Query
Configuration files
ntp.conf
135-139, 445 - NetBIOS
Enumeration
Domain
SMB/Samba shares
Null Session
Connectin with PSExec
Configuration Files
Smb.conf
lmhosts
135, 593 - Microsoft Windows RPC Services and Microsoft RPC Services over HTTP
Enumeration
161 - SNMP
Enumeration
Available nse scripts:
Default Community Strings
Bruteforce
Configuration files
snmp.conf
snmpd.conf
snmp-config.xml
264 - Check Point FireWall-1 Topology
Enumeration
389, 636 - LDAP
Enumeration
Brute force
Configuration Files
General
containers.ldif
ldap.cfg
ldap.conf
ldap.xml
ldap-config.xml
ldap-realm.xml
slapd.conf
IBM SecureWay V3 server
V3.sas.oc
Microsoft Active Directory server
msadClassesAttrs.ldif
Netscape Directory Server 4
nsslapd.sas_at.conf
nsslapd.sas_oc.conf
OpenLDAP directory server
slapd.sas_at.conf
slapd.sas_oc.conf
Sun ONE Directory Server 5.1
75sas.ldif
500/1723 - PPTP/L2TP/VPN
Aggressive mode
Testing process would go as follows:
Scan for the IKE service
Enumerate transform sets and confirm Aggressive Mode support
Run IKEForce in enum mode to obtain a valid group name or ID
Obtain a valid hash using IKE-Scan
Crack the hash using OCLHashcat
Run IKEForce in brute mode to obtain valid XAUTH credentials
Authenticate using chosen client
Pwn to your heart's content
enumerate id
Test 1
Test 2
502 - Modbus
Discover
512 - rexec
Access
Brute Force
513 - rlogin
Enumeration
Manual Login
Brute force
514 - rsh
Enumeration
Brute force
548 - AFP - Apple Filing Protocol
Enumeration
Brute force
554, 8554 - RTSP
Enumeration
Brute Force
873 - Rsync
Enumeration
1099 - Java RMI
Enumeration
Notable Exploits
Java RMI Server Insecure Default Configuration Java Code Execution
Default configuration of rmiregistry allows loading classes from remote URLs
1433, 1434 - SQL Server
Metasploit
Queries the MSSQL instance for information
Default passwords
Microsoft SQL Server Configuration Enumerator
Microsoft SQL Server xp_cmdshell Command Execution
Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration
Microsoft SQL Server Find and Sample Data
Microsoft SQL Server Generic Query
MSSQL Schema Dump
Others
Hacking SQL Server Stored Procedures
1494 - Citrix
Enumeration
1521 - Oracle
Oracle Enumeration
Brute Force
nmap
odat
metasploit
PrivEsc
Create function:
Create index:
LOGIN WITH NEW USER - VIA RAZORSQL
Start listener on Kali:
Create job:
SQL Injection References
2049 - NFS
Enumeration
no_root_squash
Case 1:
Case 2:
Configuration Files
/etc/exports
/etc/lib/nfs/xtab
2301, 2381 - Compaq/HP Insight Manager
Enumeration
Configuration Files
path.properties
mx.log
CLIClientConfig.cfg
database.props
pg_hba.conf
jboss-service.xml
.namazurc
3260 - ISCSI
Enumeration
Exploitation
3306 - MySQL
Enumeration
Quick testing
Brute Force
Privilege Escalation
Configuration Files
windows
config.ini
my.ini
windows\my.ini
winnt\my.ini
/mysql/data/
unix
my.cnf
/etc/my.cnf
/etc/mysql/my.cnf
/var/lib/mysql/my.cnf
~/.my.cnf
/etc/my.cnf
Command History
~/.mysql.history
Log Files
connections.log
update.log
common.log
3389 - RDesktop
Network level auth NLA
Brute Force
5000+ - Sybase
Enumeration
5060 - SIP
Enumeration
Configuration Files
SIPDefault.cnf
asterisk.conf
sip.conf
phone.conf
sip_notify.conf
.cfg
000000000000.cfg
phone1.cfg
sip.cfg etc. etc.
5432 - Postgresql
Enumeration
Brute Force
Exploitation
PostgreSQL 9.0, 9.1, and 9.2
5555 - HPDataProtector
RCE
5900^ - VNC
Enumeration
Brute Force
Password Attacks
Default location where the VNC password is stored
Configuration Files
.vnc
/etc/vnc/config
$HOME/.vnc/config
/etc/sysconfig/vncservers
/etc/vnc.conf
5984 - CouchDB
Enumeration
6000^ - X11
Enumeration
Screenshots
If image is black, kill screensaver:
Keyboard Command Injection
Manual
Metasploit
Sniff the keyboard keystrokes
Configuration Files
/etc/Xn.hosts
/usr/lib/X11/xdm
Search through all files for the command "xhost +" or "/usr/bin/X11/xhost +"
/usr/lib/X11/xdm/xsession
/usr/lib/X11/xdm/xsession-remote
/usr/lib/X11/xdm/xsession.0
/usr/lib/X11/xdm/xdm-config
DisplayManager*authorize:on
6379 - Redis
Enumeration
Exploitation
9001, 9030 - Tor
Enumeration
9100 - PJL - Jet Direct
Enumeration
9160 - Apache Cassandra
Enumeration
Brute Force
10000 - NDMP -Network Data Management Protocol
Enumeration
11211 - Memcache
Enumeration
27017, 27018 - MongoDB
Enumeration
Brute Force
44818 - EthernetIP-TCP-UDP
Enumeration
47808 - UDP BACNet
Enumeration
Last updated
Was this helpful?