Network Infrastructure Configuration

Check List

Methodology

FTP

1

Run the following command on $TARGET

2

If $TARGET has FTP protocol, do the next command to login with Anonymous

3

and using the next command to brute force the login page, will the username or password be found or not

4

and using the next command, can we login through the browser or not

5

and if we enter, enter the commands related to FTP and exploit it using Hydra and Metasploit commands


WebDAV

1

Run on $TARGET using the WebDAV command

2

And if it was open, the next command is used to find vulnerabilities related to WebDAV service using Metasploit

3

Using the Hydra tool, we do Burte Force on this service to get the list of usernames and passwords

4

After the Burte Force command, we check if we can upload a file using the next command If we could, we will upload the PHP file that contains RCE to the service using the command

5

And we can do the same thing using the PUT method, whether we can use this method to upload a file on this service or not


SNMP

1

Run $TARTGET using the command related to SNMP discover

2

If it was open, check the vulnerabilities of the service using the command of the nuclei tool

3

Using the next command, get information from the target service such as host name and OID information, list of interfaces, configured IP addresses, hardware configuration, and sometimes more sensitive information depending on the implementation

4

Using the next command, find a list of common community strings (for example, public, private, manager, ...) and extract information from them using the snmpwalk command

5

We use the snmpset command to write and change an OID on the SNMP service

6

If the service was an old version, we write a string value on the service using the command related to SNMPv1

7

If the service was an old version, use the SNMPv1 command to write a string value on the service, but if it was not using the old version, run the SNMPv2 command on the service

8

Then open a port using the Ngrok command and execute the RCE injection command on the target and you can exploit it using Metasploit


SMB

1

If it was open, we check service vulnerabilities using Nmap with special switches for SMB

2

The next step is to use Brute Force commands on the target protocol to identify the protocol, get the username and password list, identify the domains and groups in the service, identify active services on this protocol, and identify the running processes

3

Enter the service without a password using the commands related to the smbclient tool and find the list of subscriptions and a list of information

4

The next step is to log in using the rpcclient command with an empty username so that we can connect to RPC with an empty session to scan/count users, groups, sessions and settings. If the server allows it, it exposes user information and subscriptions

5

We can do this process and exploit using Metasploit commands


Memcached

1

Use the Nmap command to identify and check the existence of the protocol on the target

2

If the service on the target is active, use the Nuclei command to identify the vulnerability on the protocol

3

Using the command related to Netcat, step by step, save the protocol version, status, items, name of identification key and list of lists

4

The next step is to test the vulnerability of DOS and DDoS the service to identify the vulnerability using commands


Redis

1

Identify the presence of the service on the target server by using the first Redis command in the cheat sheet with the Nmap tool

2

If the service is open on the target server, use the next command to check access in unauthenticated mode

3

In the next command, we use Hydra on the Brute Force service to extract a list of password lists, and with the next command, we use the Nuclei tool to check the Misconfiguration Vulnerability to the service.


Cheat Sheet

FTP

circle-info

Identify FTP

circle-info

Anonymous Login

circle-info

Brute Force

circle-info

Browser Login

circle-info

Search Exploit

circle-exclamation

circle-info

Download Files

circle-info

CLI Login

circle-info

USER

circle-info

PASS

circle-info

FTP Mode

circle-info

Download File

circle-info

Brute Force

circle-info

Recon Version

circle-info

Anonymous Login

circle-info

Brute Force

WebDAV

circle-info

Identify WebDAV

circle-info

Scan WebDAV

circle-info

Brute Force

circle-info

Scan WebDAV

circle-info

Upload Shell

circle-info

Listening

circle-info

PUT Web shell

circle-info

Listening

SNMP

circle-info

Identify SNMP

circle-info

Brute Force

Nuclei

circle-info

Misconf & Vulns

circle-info

Enumerate SNMP Public

circle-info

Enumerate SNMP Public

circle-info

SNMPv1

circle-info

SNMPv2

circle-info

Start Ngrok

circle-info

Define ENV Ngrok

circle-info

Inject RCE

circle-info

Execute Command

circle-info

Enumerate SNMP Public

circle-info

Enumerate SNMP Private

circle-info

Enumerate Windows Users

circle-info

Enumerate File Shares

SMB

circle-info

Identify SMB

circle-info

Recon Vulns

circle-info

Brute Force

circle-info

Enumerate Users and Shares

circle-info

Enumerate Domains and Groups

circle-info

Enumerate Services and Processes

Nuclei

circle-info

SMB Misconf & Vulns

circle-info

Enum Host

circle-info

Enumerate Shares

circle-info

Enumerate Shares

circle-info

User Enumeration and Null Sessions

circle-info

User Enumeration and Null Sessions

circle-info

Detect Version

circle-info

Enumerate Users

circle-info

Enumerate Shares

circle-info

Credential Dumps

circle-info

Credential Brute Force

circle-info

Detect EternalBlue

circle-info

Start Ngrok

circle-info

Define ENV Ngrok

circle-info

Cert Spoof

circle-info

Define ENV Cert

circle-info

Post-EXP

circle-info

EternalBlue Exploit (ٌWin 7 to 10 - Win Server 2008 to 2012)

circle-info

Doublepulsar Exploit (ٌWin 7 to 10 - Win Server 2008 to 2012)

circle-info

SMBGhost Exploit (Win 10)

circle-info

Net API Exploit (Win XP's)

Memcached

circle-info

Identify Memcached

circle-info

Memcached Misconf

circle-info

Get Version

circle-info

Get Status

circle-info

Get Slabs

circle-info

Get Items

circle-info

Get Key Names

circle-info

Get Info Saved

circle-info

Denial of Service

circle-info

DDoS Amplification

circle-info

Get Stats

circle-info

Get all items

circle-info

Get info inside the item(s)

Metasploitarrow-up-right

circle-info

Extract Slabs

circle-info

Denial of Service

Redis

circle-info

Identify Redis

circle-info

Unauthorized Access

circle-info

Brute Force Creds

circle-info

Scan Misconf with Nuclei

circle-info

Scan with Metasploit

circle-info

Misconfiguration Check

circle-info

Brute Force

Exploitation

circle-info

Remote Code Execution

Last updated