1.3 Enumeration PTP
1.3 Enumeration PTP
1 Enumeration
3.2 NetBIOS
3.3 SNMP
3.4 Conclusions
https://technet.microsoft.com/en-us/library/bb962072.aspx
https://support.microsoft.com/en-us/help/204279/direct-hosting-of-smb-over-tcp-ip
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP
-c (cache) Lists NBT's cache of remote [machine] names and their
IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP
addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and starts Refr
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc940106(v=technet.10)
nbtscan -v [target_IP_Address]
nbtscan -v 192.168.99.0/24
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb490717(v=technet.10)
where:
• -N instructs rpcclient not to ask for the password
• -U "" sets the network username (none in this case)
Once the command completes, the prompt changes and we
are able to interact with it. We can list all the available
commands with the help command.
Penetration Testing Professional 5.0 – Caendra Inc. © 2018
As you will see in the help output, there is a very long list of
commands we can run. Each option will return specific
information from the remote system. For example, we can
retrieve the users available on the machine using the
following command:
rpcclient $> enumdomusers
user:[Administrator] rid:[0x1f4]
user:[eLS] rid:[0x3eb]
user:[Frank] rid:[0x3ed]
user:[Guest] rid:[0x1f5]
user:[HelpAssistant] rid:[0x3e8]
user:[netadmin] rid:[0x3ec]
user:[SUPPORT_388945a0] rid:[0x3ea]
rpcclient $>
https://docs.oracle.com/cd/E13161_01/tuxedo/docs10gr3/snmpmref/1tmib.html#wp1032892
Brute force • Using a tool to guess the community strings used on a system to
achieve elevated privileges.
http://www.net-snmp.org/docs/man/snmpwalk.html
http://www.net-snmp.org/
Penetration Testing Professional 5.0 – Caendra Inc. © 2018
This OID specifies which portion of the object identifier space
will be searched using GETNEXT requests.
All variables in the subtree below the given OID are queried
and their values presented to the user. If no OID is present,
snmpwalk will search the subtree rooted at SNMPv2-
SMI::mib-2 (including any MIB object values from other
MIB modules that are defined as lying within this subtree).
http://www.net-snmp.org/wiki/index.php/TUT:snmpwalk
http://www.net-snmp.org/docs/man/snmpset.html
RPCClient SNMPwalk
https://www.samba.org/samba/docs/current http://www.net-
/man-html/rpcclient.1.html snmp.org/docs/man/snmpwalk.html
Seclists
https://github.com/danielmiessler/SecLists