πŸ’»
AcuityLabs
LinkedIn
  • πŸ’»$ pwnlab.sh --gui
  • βš”οΈAttacking
    • πŸͺŸWindows & Active Directory
      • Active Directory Enumeration
      • Data Transfer
      • Execution
      • Privilege Escalation
    • 🐧Linux
      • Reconnaissance
      • Privilege Escalation
      • Lateral Movement
      • Data Transfer
      • Command and Control
    • πŸ•ΈοΈWebservices
      • Fuzzing
      • SSRF
    • πŸ› οΈOSINT
    • πŸ”Host Discovery
    • Footprinting
    • Services
      • Databases
      • SMB
      • NFS
      • SNMP
      • SMTP
    • πŸͺœPivoting & Portforwarding
  • πŸ›‘οΈDEFENDING
    • SSH
  • CTF
    • Writeups
      • HackTheBox
      • TryHackMe
  • πŸ’£Payloads
    • PayloadsAllTheThings
    • Revshells
  • πŸ“˜Ressources
    • Mindmap
    • GTFOBins
    • LOLBAS
    • WADCOMS
    • SPLOITIFY
    • MALAPI
  • Knowledge Bases
    • Pentest Everything
    • Hacker Recipes
    • Pentest Book
    • HackTricks
    • HackTricks Cloud
  • πŸ”‘Wordlists
    • Weakpass
    • Assetnote
    • Seclists
Powered by GitBook
On this page
  • DNS
  • SMB
  • RDP
  • WMI
  • IMAP/S
  1. Attacking

Footprinting

DNS

# Query related nameservers via DIG
dig ns acuity.lab @203.0.113.50

# Query Version details via DIG (for bind servers)
dig CH TXT version.bind 203.0.113.50

# Query all available DNS records via DIG
dig any acuity.lab @203.0.113.50

# Query AXFR Zone Transfer via DIG
dig AXFR acuity.lab @203.0.113.50

# Remember to test Zone Transfer on other DNS zones
dig AXFR internal.acuity.lab @203.0.113.50

# Subdomain Brute Forcing (manual)
for sub in $(cat /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-110000.txt);do dig $sub.acuity.lab @203.0.113.50 | grep -v ';\|SOA' | sed -r '/^\s*$/d' | grep $sub | tee -a subdomains.txt;done

# Subdomain Bruteforce via dnsenum
dnsenum --dnsserver 203.0.113.50 --enum -p 0 -s 0 -o subdomains.txt -f /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-110000.txt acuity.lab

SMB

smbclient -N -L //203.0.113.50

RDP

# Using NMAP Scripting Engine (detectable by EDR)
nmap -sV -sC 203.0.113.50 -p3389 --script rdp*

# Identify security checks based on handshakes
https://github.com/CiscoCXSecurity/rdp-sec-check

WMI

# Impacket Script Suite (https://github.com/fortra/impacket)
/opt/scripts/wmiexec.py acu1ty:"SuperStr00ng!"@203.0.113.50 "hostname"

IMAP/S

curl -k 'imaps://203.0.113.50' --user acuity:SuperStr00ng! -v
PreviousHost DiscoveryNextServices

Last updated 10 months ago

βš”οΈ