Network Pentest
arp-scan
scan local network ips
arp-scan --localnet 192.168.1.0/24netdiscovery
netdiscovery -r 172.20.0.0/24BruteSpray
Using Custom Wordlists:
python brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5Brute-Forcing Specific Services:
python brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5Specific Credentials:
python brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5Continue After Success:
python brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -cUse Nmap XML Output
Use JSON Output
Interactive Mode
Supported Services
ssh
ftp
telnet
vnc
mssql
mysql
postgresql
rsh
imap
nntp
pcanywhere
pop3
rexec
rlogin
smbnt
smtp
svn
vmauthd
snmp
IMCP SCAN
TCP LARGE SCAN
HTTP PORT SCAN
UDP SCAN
SCTP SCAN
Internal/On-Site Scan
Passsive wardriving
-p= Passive mode : only sniff
Active wardriving
Normal Network scan
1. Nmap:
Large Network Scan
1. Masscan:
2. Zmap:
3. Unicornscan :
4. hping :
Nmap Basics
Default Scripts + Server Version check
If cannot ping , just scan all port
Check for subnets
Check for SMB vulnerability
Check for SSL
Check all scripts
Check for subdomain
Bypass Firewall Techniques
Fragmentation : Bypass firewall packet inspection
Resizing MTU : Confuse firewall packet size inspection
Using decoy address : spoof packets from other hosts to confuse or obfuscate the target system
RND: 10 = Fake IP up to 10
Idle Zombie Scan : using other host to scan
Source Port Number Specification : for firewall that only allow certain ports
Append Random Data : add more data to packet to confuse firewall
Scan with Random Order : avoid behaviour detection
MAC Address Spoofing : change mac address to bypass MAC address-based filters
Send Bad Checksums : abuse firewall that only check badsum
TCP/IP Fragmentation : bypass firewall rules that are based on packet contents
Advanced one-liner :
Threader3000
Last updated
Was this helpful?