Network Infrastructure Configuration
Check List
Methodology
FTP
Run the following command on $TARGET
If $TARGET has FTP protocol, do the next command to login with Anonymous
and using the next command to brute force the login page, will the username or password be found or not
and using the next command, can we login through the browser or not
and if we enter, enter the commands related to FTP and exploit it using Hydra and Metasploit commands
WebDAV
Run on $TARGET using the WebDAV command
And if it was open, the next command is used to find vulnerabilities related to WebDAV service using Metasploit
Using the Hydra tool, we do Burte Force on this service to get the list of usernames and passwords
After the Burte Force command, we check if we can upload a file using the next command If we could, we will upload the PHP file that contains RCE to the service using the command
And we can do the same thing using the PUT method, whether we can use this method to upload a file on this service or not
SNMP
Run $TARTGET using the command related to SNMP discover
If it was open, check the vulnerabilities of the service using the command of the nuclei tool
Using the next command, get information from the target service such as host name and OID information, list of interfaces, configured IP addresses, hardware configuration, and sometimes more sensitive information depending on the implementation
Using the next command, find a list of common community strings (for example, public, private, manager, ...) and extract information from them using the snmpwalk command
We use the snmpset command to write and change an OID on the SNMP service
If the service was an old version, we write a string value on the service using the command related to SNMPv1
If the service was an old version, use the SNMPv1 command to write a string value on the service, but if it was not using the old version, run the SNMPv2 command on the service
Then open a port using the Ngrok command and execute the RCE injection command on the target and you can exploit it using Metasploit
SMB
If it was open, we check service vulnerabilities using Nmap with special switches for SMB
The next step is to use Brute Force commands on the target protocol to identify the protocol, get the username and password list, identify the domains and groups in the service, identify active services on this protocol, and identify the running processes
Enter the service without a password using the commands related to the smbclient tool and find the list of subscriptions and a list of information
The next step is to log in using the rpcclient command with an empty username so that we can connect to RPC with an empty session to scan/count users, groups, sessions and settings. If the server allows it, it exposes user information and subscriptions
We can do this process and exploit using Metasploit commands
Memcached
Use the Nmap command to identify and check the existence of the protocol on the target
If the service on the target is active, use the Nuclei command to identify the vulnerability on the protocol
Using the command related to Netcat, step by step, save the protocol version, status, items, name of identification key and list of lists
The next step is to test the vulnerability of DOS and DDoS the service to identify the vulnerability using commands
Redis
Identify the presence of the service on the target server by using the first Redis command in the cheat sheet with the Nmap tool
If the service is open on the target server, use the next command to check access in unauthenticated mode
In the next command, we use Hydra on the Brute Force service to extract a list of password lists, and with the next command, we use the Nuclei tool to check the Misconfiguration Vulnerability to the service.
Cheat Sheet
FTP
Misconfiguration & Vulnerabilities
WebDAV
SNMP
Nuclei
SMB
Nuclei
Memcached
Redis
Exploitation
Last updated