Network Infrastructure Configuration

Check List

Methodology

FTP

1

Run the following command on $TARGET

2

If $TARGET has FTP protocol, do the next command to login with Anonymous

3

and using the next command to brute force the login page, will the username or password be found or not

4

and using the next command, can we login through the browser or not

5

and if we enter, enter the commands related to FTP and exploit it using Hydra and Metasploit commands


WebDAV

1

Run on $TARGET using the WebDAV command

2

And if it was open, the next command is used to find vulnerabilities related to WebDAV service using Metasploit

3

Using the Hydra tool, we do Burte Force on this service to get the list of usernames and passwords

4

After the Burte Force command, we check if we can upload a file using the next command If we could, we will upload the PHP file that contains RCE to the service using the command

5

And we can do the same thing using the PUT method, whether we can use this method to upload a file on this service or not


SNMP

1

Run $TARTGET using the command related to SNMP discover

2

If it was open, check the vulnerabilities of the service using the command of the nuclei tool

3

Using the next command, get information from the target service such as host name and OID information, list of interfaces, configured IP addresses, hardware configuration, and sometimes more sensitive information depending on the implementation

4

Using the next command, find a list of common community strings (for example, public, private, manager, ...) and extract information from them using the snmpwalk command

5

We use the snmpset command to write and change an OID on the SNMP service

6

If the service was an old version, we write a string value on the service using the command related to SNMPv1

7

If the service was an old version, use the SNMPv1 command to write a string value on the service, but if it was not using the old version, run the SNMPv2 command on the service

8

Then open a port using the Ngrok command and execute the RCE injection command on the target and you can exploit it using Metasploit


SMB

1

If it was open, we check service vulnerabilities using Nmap with special switches for SMB

2

The next step is to use Brute Force commands on the target protocol to identify the protocol, get the username and password list, identify the domains and groups in the service, identify active services on this protocol, and identify the running processes

3

Enter the service without a password using the commands related to the smbclient tool and find the list of subscriptions and a list of information

4

The next step is to log in using the rpcclient command with an empty username so that we can connect to RPC with an empty session to scan/count users, groups, sessions and settings. If the server allows it, it exposes user information and subscriptions

5

We can do this process and exploit using Metasploit commands


Memcached

1

Use the Nmap command to identify and check the existence of the protocol on the target

2

If the service on the target is active, use the Nuclei command to identify the vulnerability on the protocol

3

Using the command related to Netcat, step by step, save the protocol version, status, items, name of identification key and list of lists

4

The next step is to test the vulnerability of DOS and DDoS the service to identify the vulnerability using commands


Redis

1

Identify the presence of the service on the target server by using the first Redis command in the cheat sheet with the Nmap tool

2

If the service is open on the target server, use the next command to check access in unauthenticated mode

3

In the next command, we use Hydra on the Brute Force service to extract a list of password lists, and with the next command, we use the Nuclei tool to check the Misconfiguration Vulnerability to the service.


Cheat Sheet

FTP

Identify FTP

Anonymous Login

Brute Force

Browser Login

Search Exploit

Download Files

CLI Login

USER

PASS

FTP Mode

Download File

Brute Force

Recon Version

Anonymous Login

Brute Force

WebDAV

Identify WebDAV

Scan WebDAV

Brute Force

Scan WebDAV

Upload Shell

Listening

PUT Web shell

Listening

SNMP

Identify SNMP

Brute Force

Nuclei

Misconf & Vulns

Enumerate SNMP Public

Enumerate SNMP Public

SNMPv1

SNMPv2

Start Ngrok

Define ENV Ngrok

Inject RCE

Execute Command

Enumerate SNMP Public

Enumerate SNMP Private

Enumerate Windows Users

Enumerate File Shares

SMB

Identify SMB

Recon Vulns

Brute Force

Enumerate Users and Shares

Enumerate Domains and Groups

Enumerate Services and Processes

Nuclei

SMB Misconf & Vulns

Enum Host

Enumerate Shares

Enumerate Shares

User Enumeration and Null Sessions

User Enumeration and Null Sessions

Detect Version

Enumerate Users

Enumerate Shares

Credential Dumps

Credential Brute Force

Detect EternalBlue

Start Ngrok

Define ENV Ngrok

Cert Spoof

Define ENV Cert

Post-EXP

EternalBlue Exploit (ÙŒWin 7 to 10 - Win Server 2008 to 2012)

Doublepulsar Exploit (ÙŒWin 7 to 10 - Win Server 2008 to 2012)

SMBGhost Exploit (Win 10)

Net API Exploit (Win XP's)

Memcached

Identify Memcached

Memcached Misconf

Get Version

Get Status

Get Slabs

Get Items

Get Key Names

Get Info Saved

Denial of Service

DDoS Amplification

Get Stats

Get all items

Get info inside the item(s)

Metasploit

Extract Slabs

Denial of Service

Redis

Identify Redis

Unauthorized Access

Brute Force Creds

Scan Misconf with Nuclei

Scan with Metasploit

Misconfiguration Check

Brute Force

Exploitation

Remote Code Execution

Last updated