Practical Plan
Practical Plan
The goal of this session is to understand how to conduct a comprehensive network scan to
gather valuable information about the target network infrastructure, such as open ports, services,
OS details, and vulnerabilities.
Tools Required:
2. Service Version Detection: Once open ports are discovered, perform service version
detection to gather details about services running on those ports:
3. OS Fingerprinting: Try to identify the operating system of the target system using:
nmap -O <target-ip>
Masscan is a high-speed scanner that can scan large networks much faster than Nmap.
For example, scanning a subnet for HTTP servers:
Netcat can be used to manually grab banners from services to get additional information:
nc <target-ip> 80
(This connects to port 80 and will often return a banner from web servers.)
1. Using Nessus: Nessus is a robust vulnerability scanner. Launch the web interface
(usually on port 8834) and configure a scan for the target. Choose from predefined scan
templates like "Basic Network Scan" or create a custom scan.
2. Using OpenVAS: OpenVAS is an open-source vulnerability scanner. Similar to Nessus,
configure a scan using its web interface to check for vulnerabilities on the target.
Tools Required:
enum4linux -S <target-ip>
enum4linux -U <target-ip>
This lists the users within the SMB service (Windows file sharing).
enum4linux -a <target-ip>
This runs a brute force subdomain enumeration script against the target DNS server.
This checks whether the DNS server will allow zone transfers, which could expose
valuable domain information.
4. SMTP Enumeration
1. Check for open SMTP relays that can be used to send emails:
This attempts to verify users by sending VRFY commands to the SMTP server.
6. Linux Enumeration
wget
https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnu
m.sh
chmod +x LinEnum.sh
./LinEnum.sh
2. Manual Enumeration: Look for user accounts, groups, and running processes. Useful
commands include:
o cat /etc/passwd (view users)
o ps aux (view running processes)
o find / -name '*.bak' (look for backup files)
7. Windows Enumeration
1. Net user: In Windows environments, the net user command can reveal user accounts.
net user
2. PowerShell: Use PowerShell to enumerate user accounts or groups:
Get-LocalUser
Get-LocalGroup
Use Multiple Tools: Different tools may provide different perspectives on the same
target.
Stay Stealthy: Perform enumeration in a non-intrusive way to avoid detection by
IDS/IPS systems.
Minimize Impact: Ensure that your enumeration activities do not disrupt services or
cause performance degradation.
Always ensure you have explicit permission to perform enumeration on the target
network.
Document your findings thoroughly and responsibly.
Report any sensitive or confidential information appropriately, following legal and
organizational protocols.
Practical Takeaway: