Skip to content

Quick scan

lethanhtung01011980 edited this page Apr 24, 2020 · 9 revisions

Goals

  • To quick start an attack

Scan

  • Scan all: ./nmapAutomator.sh ip All
  • Scan all ports: nmap -p- -T4 -A -v ip
  • Scan vuln for a port: nmap -v --script=vuln ip -pXX -T4
  • Scan exploit for a port: nmap -v --script exploit -pXX ip

FTP

  • Scan for anonymous FTP: nmap -v -p 21 --script=ftp-anon.nse ip
  • FTP with backdoor: ftp-proftpd-backdoor.nse, ftp-vsftpd-backdoor.nse and ftp-vuln-cve2010-4221.nse

SMB

  • Scan for SMB: nmap -v $ip --script smb-os-discovery.nse

Web

Samba

  • enum4linux -U -o ip

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally