Windows
https://github.com/xapax/oscp/blob/master/templates/windows-template.md
Info-sheet
DNS-Domain name:
Host name:
OS:
Server:
Workgroup:
Windows domain:
Services and ports:Recon
Always start with a stealthy scan to avoid closing ports.
# Syn-scan
nmap -sS INSERTIPADDRESS
# Service-version, default scripts, OS:
nmap INSERTIPADDRESS -sV -sC -O
# Scan all ports, might take a while.
nmap INSERTIPADDRESS -p-
# Scan for UDP
nmap INSERTIPADDRESS -sU
unicornscan -mU -v -I INSERTIPADDRESS
# Connect to udp if one is open
nc -u INSERTIPADDRESS 48772
# Monster scan
nmap INSERTIPADDRESS -p- -A -T4 -sCPort 21 - FTP
Name:
Version:
Anonymous login:
Port 22 - SSH
Name:
Version:
Protocol:
RSA-key-fingerprint:
Takes-password:
If you have usernames test login with username:username
Port 25
Name:
Version:
VRFY:
EXPN:
Port 110 - Pop3
Name:
Version:
Port 135 - MSRPC
Some versions are vulnerable.
Exploit:
Port 139/445 - SMB
Name:
Version:
Domain/workgroup name:
Domain-sid:
Allows unauthenticated login:
Port 161/162 UDP - SNMP
Port 554 - RTSP
Port 1030/1032/1033/1038
Used by RPC to connect in domain network. Usually nothing.
Port 1433 - MSSQL
Version:
If you have credentials look in metasploit for other modules.
Port 1521 - Oracle
Name: Version: Password protected:
Port 2100 - Oracle XML DB
Can be accessed through ftp. Some default passwords here: https://docs.oracle.com/cd/B10501_01/win.920/a95490/username.htm
Name:
Version:
Default logins:
Port 2049 - NFS
3306 - MySQL
Name:
Version:
Port 3339 - Oracle web interface
Basic info about web service (apache, nginx, IIS)
Server:
Scripting language:
Apache Modules:
IP-address:
Domain-name address:
Port 3389 - Remote desktop
Test logging in to see what OS is running
Port 80
Server:
Scripting language:
Apache Modules:
Domain-name address:
INSERTCURLHEADER
Web application
Name:
Version:
Nikto scan
INSERTNIKTOSCAN
Url brute force
INSERTDIRBSCAN
Default/Weak login
Google documentation for default passwords and test them:
LFI/RFI
SQL-Injection
Sql-login-bypass
Open Burp-suite
Make and intercept request
Send to intruder
Cluster attack
Paste in sqlibypass-list (https://bobloblaw.gitbooks.io/security/content/sql-injections.html)
Attack
Check for response length variation
Password brute force - last resort
Port 443 - HTTPS
Heartbleed:
Vulnerability analysis
Now we have gathered information about the system. Now comes the part where we look for exploits and vulnerabilities and features.
To try - List of possibilities
Add possible exploits here:
Find sploits - Searchsploit and google
Where there are many exploits for a software, use google. It will automatically sort it by popularity.
'''''''''''''''''''''''''''''''''' PRIVESC '''''''''''''''''''''''''''''''''
Privilege escalation
Now we start the whole enumeration-process over gain. This is a checklist. You need to check of every single one, in this order.
Kernel exploits
Cleartext password
Reconfigure service parameters
Inside service
Program running as root
Installed software
Scheduled tasks
Weak passwords
To-try list
Here you will add all possible leads. What to try.
Basic info
OS:
Version:
Architecture:
Current user:
Hotfixes:
Antivirus:
Users:
Localgroups:
Kernel exploits
Cleartext passwords
Reconfigure service parameters
Unquoted service paths
Check book for instructions
Weak service permissions
Check book for instructions
Inside service
Check netstat to see what ports are open from outside and from inside. Look for ports only available on the inside.
Programs running as root/system
Installed software
Scheduled tasks
Weak passwords
Remote desktop
Useful commands
Add user and enable RDP
----------------------------- LOOT LOOT LOOT LOOT -------------------
Loot
Proof:
Network secret:
Password and hashes:
Dualhomed:
Tcpdump:
Interesting files:
Databases:
SSH-keys:
Browser:
Proof
Network secret
Passwords and hashes
Dualhomed
Tcpdump
Interesting files
Mail
Browser
Browser start-page:
Browser-history:
Saved passwords:
Databases
SSH-keys
How to replicate:
Last updated
Was this helpful?
