-
Assessment Methodologies – Enumeration CTF 1
•
5 min read
Lab number 3, utilising the following tools > This time, I only have familiarity with the first two. I am aware of the others, and may have used Hydra in the past on another abandoned learning journey wen attempting to brute force. So, as usual, I start with checking out where I am and what…
-
SMTP Enum
•
1 min read
Not a lot to say with this one. It was pretty brief and straight-forward. The downside is I won’t have enough time to get the CTF completed in today’s learning window, so I’ll have to do that another time. It looks tricky though, so I’m looking forward to it.
-
MySQL / SSH Enum
•
1 min read
More enumeration covered with assistance from the Metasploit framework… Next is SMTP, then another lab / CTF.
-
HTTP Enum
•
1 min read
Some light webserver enumeration (Apache focused, really) using MSFConsole.
-
FTP / SMB Enum
•
1 min read
Via MSF, and using global variables. On my way to becoming a script kiddie lol.
-
MSF Auxilliary Modules
•
1 min read
Just some basic port / service discovery, with a cheeky pivot via a meterpreter session made possible by a XOMA exploit. Good fun.
-
Nmap + MSF
•
1 min read
Not as much time to study today, unfortunately. I was only able to cover a couple of small modules rehashing exporting Nmap scans to XML, then importing into MSF for organisation. Thanks H.D. Moore!
-
Nmap Output Files & Zenmap
•
1 min read
Took a look at these two topics today. XML output to import into Metasploit looks tasty, ngl. On to the next module, more in depth enumeration!
-
Nmap Scan Optimisation
•
1 min read
Optimising for success, either via stealth or speed. Timing templates vs specified delays / timeouts… Output formats are next, followed by a quick look at Zenmap too.
-
Second lab time, with the best tools listed for this lab being: So I start with checking out where I am and what I’m scanning.ifconfig gives me my IP and subnet, a quick scan on that with nmap -sn <subnet> tells me I’m going to be looking at 192.244.169.3 (aka target.ine.local). Flag 1: The server…