What is enumeration?
Enumeration involves an attacker creating active connections with a target system and performing directed queries to gain more information about the target
Enumration techniques are conducted in an intranet environment
What information can an attacker gain from enumeration?
What are information form enumeration used for?
Techniques for Enumeration?
Port and services to Enumerate?
What can an attack obtain from NetBIOS?
What information do you get from a “nbtstat” command?
(Can also be done from Nmap)
List some PsTools (SysInternals) - Extreme powerful tool
What is the net view command used for?
How does SNMP work?
Listen on UDP port 161
- Default password (“Public”/”Private”)
- Clear text password if changed
Use the Nmap snmp-info NSE script against an SNMP remote server to retrieve information related to the hosted SNMP services
Tell about LDAP (Lightweight directory access protocol)
Attackers quiry the LDAP service to gather information, such as valid usernames, adressess, and departmental details, which can be further used to perform attacks
Tell abput NTP (Network Time Protocol)?
It uses UDP port 123 as its primary means of communication
Attackers query the NTP server to gather valuable information, such as:
- List of connected hosts
- Clients IP addresses in a netwirk, their system names and OS’s
- Internal IPs can also be obtained if the NTP server is in the demilitarized zone (DMZ)
Tell about NFS
What are the three build in commands in SMTP?
SMTP servers respond differently to the commands for valid and invalid users, which means an attacker can determine valid users on the SMTP server.
Attackers can directly interact with SMTP via the telnet prompt and collect a list of valid users on the SMTP server
What can an attacker obtain if the target DNS server allows zone transfer?
What is DNSSEC zone walking?
It is a DNS enumeration technique where an attacker attempts to obtain internal records of the DNS server if the DNS zone is not properly configured
What are IPsec uses for?
Secure communication between VPN end points.
Often a simple scanning for ISAKMP at UDP port 500 can indicate the presence of a VPN gateway
Name VoIP attacks?
Dos, Session Hijacking, Caller ID spoofing, Eavesdropping, Spamming over Internet Telephony and Vishing
VoIP uses SIP protocol to enable voice and video calls over an IP network. SIP service generally uses UDP/TCP ports 2000, 2001, 5060, and 5061
Tell about Telnet
Uses port 23, and if open gives access to shared services