githubEdit

Enumeration Methodology

1) Low Hanging Fruits

  1. Check for anonymous access for FTP and SMB protocols

If yes, then grab any files you find within the network share or FTP folder

  1. Check protocol/application version for possible public RCE or similar exploit (Example: EternalBlue)

  2. Within a web page, check the page source for any comments that might have been left out (<!--) or interesting files that we might encounter

They may contain credentials, etc

  1. Check for unique files that you can analyze. You might find sensitive data there.

  2. Use technologies like wappalyzer to get info about the version of technologies to search for public exploits

  3. Use nikto to scan for low hanging fruit

     nikto -h TARGET_SERVER

2) Directory Fuzzing

Enumerate the directories of a webserver to check for admin pages, specific application directories, etc to further discover the webapp

You can also enumerate other interesting files like .txt, .conf or .php

Wordlists to use:

  1. common.txt

  2. directory-list-2.3-medium.txt

    feroxbuster -u http://DOMAIN.LOCAL/ -w /usr/share/wordlists/dirb/common.txt -C 404 -x txt

3) Subdomain/Vhost Fuzzing

Enumerate vhosts of the machine to discover another attack surface

Use the filters for false positives

Wordlists to use:

DNS-Subdomains-top-1million-11000.txt

If port 53 (DNS) is open, you can attempt to do a zone transfer to dump all DNS entries from a host

4) CMS Enumeration

If we find a wordpress installation on the server, use wpscan tool to scan for information.

You can also conduct attacks with wpscan like bruteforce if we have a valid user.

Same methodology works with other CMS as well like Joomla and Drupal

5) Sensitive data from important files

6) Password reuse

Sometimes, when we uncover credentials, they may be reused on other applications as well.

Use credentials for admin pages, SSH, FTP, SMB, MySQL

7) Default credentials

When we find services and admin portals, we can always try default credentials just in case

8) Brute-force/Password Spray

ONLY USE THIS AS A LAST RESORT OR IF YOU FOUND ANY HINTS THAT THE PASSWORD FOR A SPECIFIC USER IS WEAK AND NEEDS TO BE CHANGED

Use tools like Hydra, Burp Intruder, wpscan

If rockyou.txt wordlist takes a long time to crack a password (10-30 minutes), use cewl on a target webserver to create a custom wordlist, then use this to crack the password

Last updated