Network Pentest

arp-scan

scan local network ips

arp-scan --localnet 192.168.1.0/24

netdiscovery

netdiscovery -r 172.20.0.0/24

BruteSpray

Using Custom Wordlists:

python brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5

Brute-Forcing Specific Services:

python brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5

Specific Credentials:

python brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5

Continue After Success:

python brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -c

Use Nmap XML Output

Use JSON Output

Interactive Mode

Supported Services

  • ssh

  • ftp

  • telnet

  • vnc

  • mssql

  • mysql

  • postgresql

  • rsh

  • imap

  • nntp

  • pcanywhere

  • pop3

  • rexec

  • rlogin

  • smbnt

  • smtp

  • svn

  • vmauthd

  • snmp

IMCP SCAN

TCP LARGE SCAN

HTTP PORT SCAN

UDP SCAN

SCTP SCAN

Internal/On-Site Scan

Passsive wardriving

  • -p = Passive mode : only sniff

Active wardriving

Normal Network scan

1. Nmap:

Large Network Scan

1. Masscan:

2. Zmap:

3. Unicornscan :

4. hping :

Nmap Basics

Default Scripts + Server Version check

If cannot ping , just scan all port

Check for subnets

Check for SMB vulnerability

Check for SSL

Check all scripts

Check for subdomain

Bypass Firewall Techniques

Fragmentation : Bypass firewall packet inspection

Resizing MTU : Confuse firewall packet size inspection

Using decoy address : spoof packets from other hosts to confuse or obfuscate the target system

  • RND: 10 = Fake IP up to 10

Idle Zombie Scan : using other host to scan

Source Port Number Specification : for firewall that only allow certain ports

Append Random Data : add more data to packet to confuse firewall

Scan with Random Order : avoid behaviour detection

MAC Address Spoofing : change mac address to bypass MAC address-based filters

Send Bad Checksums : abuse firewall that only check badsum

TCP/IP Fragmentation : bypass firewall rules that are based on packet contents

Advanced one-liner :

Threader3000

Last updated

Was this helpful?