Get IP using another DNS Server (useful if UPD 53 is open on the target server)
1
dig -server 8.8.8.8 www. www.blah.com
Do a reverse lookup
1
dig @8.8.8.8 -x 8.8.8.8
Dig all the things
1
dig www.blah.com ANY
Low Hanging Passwords
Enumerate password on windows
1
dir /b /a /s c:\ > cdirs.txt
After downloading .txt file to the attackers machine open it.
1 2 3 4
Parse for keywords command: type cdirs.txt | findstr /i passw After finding interesting file or directory command: type c:\Users\Fred\Documents\passwords.txt
One thing to remember is we only enumerated the c:\ drive on the pc. There could be other network drives.
Enumerate password on linux
We gonna search in /etc for the word password It could also be in /home or /var for the word pwd
SOCAT is another tool that can be used to do the “dumb pipe” traffic forwarding. The environment in this exercise remains the same as in the previous scenario.
# Pivot 1 using proxychains ssh -D 1080 user@IP_Network1
# Configure /etc/proxychains to set port 1080 # Pivot 2 using proxychains proxychains ssh -D 1081 user@IP_Network2
# Configure /etc/proxychains to set port 1081
proxychains nmap...
PivotSuite
1 2 3 4 5 6 7 8 9
# Similar features to other tools but support multilevel pivot # Like Metasploit
# "Remote" local port forwarding # On the pivot $ pivotsuite -S -F --server-option=PF --forward-ip=10.42.42.2 --forward-port=80 --server-ip=192.168.2.105 --server-port=8080