Network Services Attacks
Description
Techniques for exploiting common network services
Techniques
Service Enumeration
Use NMAP, Enum4linux
SMB
Installation of smbclient: smbclient //[IP]/[SHARE]
with the tags -U [name] : to specify the user -p [port] : to specify the port
Telnet
telnet [IP] [port]
https://www.cvedetails.com/ https://cve.mitre.org/
FTP
ftp [ip]
ftp arp poisoning: https://www.jscape.com/blog/bid/91906/Countering-Packet-Sniffers-Using-Encrypted-FTP
NFS
/usr/sbin/showmount -e [ip]
NFS-Common
https://tryhackme.com/room/networkservices2
Mounting NFS shares
sudo mount -t nfs IP:share /tmp/mount/ -nolock
Tag Function sudo Run as root mount Execute the mount command -t nfs Type of device to mount, then specifying that it's NFS IP:share The IP Address of the NFS server, and the name of the share we wish to mount -nolock Specifies not to use NLM locking
root_squash
SMTP
https://www.afternerd.com/blog/smtp/
"smtp_version" module in MetaSploit
Enumerate users using SMTP: RFY (confirming the names of valid users) and EXPN (which reveals the actual address of user’s aliases and lists of e-mail (mailing lists)
Version scanner: auxiliary/scanner/smtp/smtp_version
MySQL
https://dev.mysql.com/doc/dev/mysql-server/latest/PAGE_SQL_EXECUTION.html
https://www.w3schools.com/php/php_mysql_intro.asp
To install client: sudo apt install default-mysql-client
nmap's mysql-enum script: https://nmap.org/nsedoc/scripts/mysql-enum.html or https://www.exploit-db.com/exploits/23081
Connect to mysql database: mysql -h [IP] -u [username] -p
mysql schema dump: auxiliary/scanner/mysql/mysql_schemadump hash dump: auxiliary/scanner/mysql/mysql_hashdump
Resources
Last updated