Scanning & Enumeration
VMWare lab
๐ Free VMWare Workstation Pro
๐ VirtualBox
Download the following PEH Course VMs based on vulnerable VMs from VulnHub
Import
Kioptrix.ovaset RAM to
256MBor512MBset the VM Network Adapter to
NAT, the sameNATnetwork of the Kali VMrun the virtual machine, select
Do nothingif asked and let it boot to the login screen


๐ kioptrix login user credentials are -
john:TwoCows2
Nmap scanning
From the Kali VM, find its network and user netdiscover to find the Kioptrix VM IP
Tools for network discovery -
netdiscover,arp-scan
โก๏ธ nmap - utility for network discovery and security auditing
Look for open sports and what is running on those ports
Look at the open ports and get all the details down by taking notes:
22- ssh - OpenSSH 2.9p2 (protocol 1.99)80- http - Apache httpd 1.3.20111- rpcbind139- netbios-ssn Samba smbd443- ssl/https - Apache/1.3.20 (Unix) (Red-Hat/Linux)OS details:
Linux 2.4.9- 2.4.18 (likely embedded)
Enumerating HTTP and HTTPS
PORTS -
80,443
Usually WebServers
Navigate to the webpage at http://192.168.31.130/ and https://192.168.31.130/ (the IP will change based on the Kioptrix VM IP)

Check webpage source code - view-source:http://192.168.31.130/ - and search for exposed data
Architecture enumeration
runs Apache
the VM (potentially) runs Red Hat Linux
other web directories may be present (dir-busting)
public default webpage - poor hygiene
Information disclosure
Apache 1.3.20


nikto
โก๏ธ nikto - web server scanner
Save the scan to a file
dirbuster
โก๏ธ dirbuster (GUI) - multi threaded java application designed to brute force directories and files names on web/application servers
Look for any sort of interesting directory
Check the HTTP response codes
Dig and navigate to sub-pages and find disclosed information


burpsuite
โก๏ธ Burp Suite
Use BurpSuite to find disclosed information when navigating the found webpages
server header disclosed version information


Webalizer Version 2.01
Enumerating SMB
PORT -
139
Usually file servers
Kioptrix nmap:
_smb2-time: Protocol negotiation failed (SMB2)
Metasploit
โก๏ธ Metasploit
smbclient
โก๏ธ smbclient
Quick fix for some errors

Enumerating SSH
PORT -
22
OpenSSH 2.9p2
Attempt to connect to SSH via the port
A login attempt on SSH is exploitation
If a banner is exposed, server version can be exposed
Research potential vulnerabilities
๐ Always take good and concise assessment notes about the identified/exposed data and versions
make them clean, screenshots with border, sections, etc
80/443-192.168.31.130-
Default webpage - Apache, PHP
Information Disclosure - 404 page
Information Disclosure - server headers disclose version information
80/tcp open http Apache httpd 1.3.20 ((Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b)
mod_ssl/2.8.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082
Webalizer Version 2.01 - http://192.168.31.130/usage/
139/tcp open netbios-ssn Samba smbd (workgroup: MYGROUP)
Unix (Samba 2.2.1a)
22/tcp open ssh
OpenSSH 2.9p2
Search Google for vulnerabilities on the services versions, e.g. <service> <version> exploit
80/443 - Potentially vulnerable to
OpenLuck (this exploit works)
Apache httpd 1.3.20 - CVEdetails
137 - Potentially vulnerable to
searchsploit
โก๏ธ searchsploit - command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you

Last updated
Was this helpful?