General methodology
If you have anything that you use in your methodology which is useful please let me know and I'll share
Last updated
If you have anything that you use in your methodology which is useful please let me know and I'll share
Last updated
Restart the box - wait 2+ minutes until it comes back and all services have started
https://coggle.it/diagram/XepDvoXedGCjPc1Y/t/enumeration-mindmap
https://www.xmind.net/m/5dypm8/#
Find service and version
Find known service bugs
Find configuration issues
Run nmap port scan / banner grabbing
Every error message
Every URL path
Every parameter to find versions/apps/bugs
Every version exploit db
Every version vulnerability
User enumeration
Password bruteforce
Default credentials google search
Nikto
dirb
dirbuster
wpscan
dotdotpwn/LFI suite
view source
davtest/cadeavar
droopscan
joomscan
LFI\RFI test
Wapalyzer
snmpwalk -c public -v1 $ip 1
smbclient -L //$ip
smbmap -H $ip
rpcinfo
Enum4linux
nmap scripts
hydra
MSF Aux Modules
Download software....uh'oh you're at this stage
Gather version numbers
Searchsploit
Default Creds
Creds previously gathered
Download the software
Have you confirmed the service on the port manually and googled all the things (the SSH string, the banner text, the source)?
Is there a service that will allow you to enumerate something useful (i.e. usernames) but maybe doesn't make that obvious (e.g. RID brute-force through SMB with crackmapexec or lookupsid.py)?
Have you used the best wordlist possible for your tasks (is there a better/bigger directory list? Is there a SecLists cred list for this service?)
Have you fuzzed the directories you have found for a) more directories, or b) common filetypes -x php,pl,sh,etc
Have you tried some manual testing (MySQL, wireshark inspections)
Have you collected all the hashes and cracked them?
Have you tried ALL COMBINATIONS of the username/passwords and not just the pairs given? Have you tried them across all services/apps?
Do the version numbers tell you anything about the host?
Have you tried bruteforce (cewl, patator)?
Can you think of a way to find more information: More credentials, more URLs, more files, more ports, more access?
Do you need to relax some of the terms used for searching? Instead of v2.8 maybe we check for anything under 3.
Do you need a break?
Screenshot of IPConfig/WhoamI
Copy proof.txt
Dump hashes
Dump SSH Keys
Delete files
Reset Machine