Network Pentesting Map:
Phase 1: Info Gathering
Phase 2: Scanning & Enumeration
Host Discovery:
- Find Live Hosts :
- Ping Sweep
- No Ping
- Tools :
- NMAP
- Hping3
- Find Live Hosts :
Port Scanning:
- NMAP :
- TCP Scan:
- TCP Connect (Active)
- TCP SYN (Half Open)
- Protocol Scan
- UDP Scan
- TCP Scan:
- NMAP NSE
- Hping3
- Fping
- Wireshark
- NMAP :
DNS Enumeration:
- Discover DNS hosts
- Enumeration DNS records
- Forward Lookup
- Reverse Lookup
- Zone transfer
- Tools:
- nslookup
- dig
- dnsbruteforce
OS Fingerprinting:
- NMAP NSE
- NMAP
- Mestasploit
- Xprobe
Service Detection:
- NMAP
- Banner Grabbing
- Netcat
- FTP
- Telnet
Idle Scan :
- Find a Zombie / Trusted Host
- Start Idle Scan
Phase 3: NetBIOS Enumeration:
- Goals:
- Testing NetBIOS and SMB shares
- Exploit weak passwords
- Exploit Null session
- Tasks:
- Check open ports
- Enumerate File Shares
- Check if possible to list files and shares using Null Session
- Try SMB Brute Force
- Enumerate Shares and Info
- Exploit The machine
- Tools:
- Enum4Linux
- Metasploit
- Nmap
- SMBClient
Phase 4: SNMP Enumeration
- Goals:
- Get a shell
- Tasks:
- Scan ports and services
- Find the community string
- Gather as much information about the machines (SNMP)
- Bruteforce the SMB host
- Get a shell
- Tools:
- Nmap
- Onesixtyone
- SNUMEnum
- Metasploit
- Hydra
Phase 5 : Exploitation
- Goals:
- Obtaining a shell
Tasks:
- Run Nessus on the live hosts
- Detect the vulnerabilities
- Look for an exploit in Metasploit modules
Get the hashes
Use PSExec exploit to get access to other machines
Tools:
- Nessus
- Metasploit
Phase 6 : Post-Exploitation
Gather information about the system:
System Architecture
Account Status
Account Persmission
Running Services and their permission level
Map the network
Privilege Escalation:
- UAC Bypass
- Exploit service misconfiguration
- Choosing the right service :
- Has high privileges:
- Look for the write permission folders, drives,etc
- Can run on low privileges
- Can run on a reboot :
- Check the booting/ start mode (auto)
- Can be DOS (service can be crashed by the DOS), to force Windows OS to reboot
- Has high privileges:
- Choosing the right service :
- Pivoting
Gather artifacts:
- Passwords
- Tokens
Tools:
- Metasplooit
- Mimikatz
- Incognito
- winenum
- win_piv
- bypassuac