Windows
https://github.com/xapax/oscp/blob/master/templates/windows-template.md
Info-sheet
DNS-Domain name:
Host name:
OS:
Server:
Workgroup:
Windows domain:
Services and ports:Recon
Always start with a stealthy scan to avoid closing ports.
# Syn-scan
nmap -sS INSERTIPADDRESS
# Service-version, default scripts, OS:
nmap INSERTIPADDRESS -sV -sC -O
# Scan all ports, might take a while.
nmap INSERTIPADDRESS -p-
# Scan for UDP
nmap INSERTIPADDRESS -sU
unicornscan -mU -v -I INSERTIPADDRESS
# Connect to udp if one is open
nc -u INSERTIPADDRESS 48772
# Monster scan
nmap INSERTIPADDRESS -p- -A -T4 -sCPort 21 - FTP
Port 22 - SSH
Port 25
Port 110 - Pop3
Port 135 - MSRPC
Port 139/445 - SMB
Port 161/162 UDP - SNMP
Port 554 - RTSP
Port 1030/1032/1033/1038
Port 1433 - MSSQL
Port 1521 - Oracle
Port 2100 - Oracle XML DB
Port 2049 - NFS
3306 - MySQL
Port 3339 - Oracle web interface
Port 3389 - Remote desktop
Port 80
Password brute force - last resort
Port 443 - HTTPS
Vulnerability analysis
To try - List of possibilities
Find sploits - Searchsploit and google
Privilege escalation
To-try list
Basic info
Kernel exploits
Cleartext passwords
Reconfigure service parameters
Inside service
Programs running as root/system
Installed software
Scheduled tasks
Weak passwords
Useful commands
Loot
Proof
Network secret
Passwords and hashes
Dualhomed
Tcpdump
Interesting files
Mail
Browser
Databases
SSH-keys
How to replicate:
Last updated