๐โ๐ฆบServices Enumeration
53 - DNS
nmap -T4 -sS -p 53 $IP/24
# Enumerate ALL DNS records! Maybe hidden hosts in network recon
dig -t all target1 target2 target3 @$DNSSERVER
# DNS recon (brute force subdomains):
dnsrecon -d $IP -t brt -D /usr/share/wordlists/dnsmap.txt
dnsenum $DOMAIN
fierce -dns $DOMAIN -wordlist dictionary.txt
# DNS subdomains enum with ffuf
./ffuf -u http://$ip -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.test.lo"Amplification
135,137,138,139 - NetBIOS
139,445 - SMB / SAMBA
RPC over DC
111 - RPC
3268 - DC Enumeration
How to recognize a DC in a windows environment
80,8080,443,8000 - HTTP
WebDAV
161 - SNMP
22 - SSH
21 - FTP
25 - SMTP
Detect version
Open Relays
User Enumeration Utility
69 - TFTP
88 - KERBEROS
Users enumeration
NFS
123 - NTP
389 - LDAP
LDAP-rootdse
LDAPsearch
443 - SSL/TLS
1433 - MSSQL
Metasploit modules
Info gathering
1521 - ORACLE
N.B.
Detect version
Get SID
Bruteforce
5432 - POSTGRESQL
Detect version
Login utility
Flag injection
6379 - Redis-server
SSDP server
11211 - memcached
9200 - elasticsearch
5353 - avahi-daemon / mDNS
27017,27018,27019,27020 - MongoDB
Last updated
