Information Gathering (Recon)

  • Discover Target (netdiscover/ arp-scan/ nmap)
    • nmap can detect devices running on different subnets
  • Discover running services (rustscan/ `nmap)

Service Enumeration

  1. Web App Enumeration
    • Directory brute-forcing (gobuster)
      • Checking for existence of /robots.txt, sitemap.xml, etc.
    • Vulnerability scan (nikto)
    • Comments in HTML code
    • Input fields - SQL injection (sqlmap)
    • File upload fields (Reverse shell)
    • Site with query parameters - LFI/RFI
    • Website version & available exploits
    • Web server configuration files
    • Web server & technology exploits
    • User-agent spoofing
  2. SMB Enumeration
    • Enumeration - share & user names (smbclient/ nmap/ enum4linux)
    • SMB version (msfconsole)
    • Exploit SMB/ Anonymous Login (smbclient)
  3. SSH Enumeration
    • Password directory attack (hydra)

Exploitation