Skip to main content

Reconnaissance


Google Enum 

#Finding PGP and GnuPG Private Key rings
site:domain.com intitle:index.of intext:"secring.skr"| "secring.pgp" | "secring.bak"

#Shell History files in interesting domains
site:domain.com intitle:index.of bash_history

#Nessus Scan Results
intitle:"Nessus Scan Report" "This file was generated by Nessus"

SearchDiggity GUI tool
Finger Enumeration

Finger Enum Script
finger @10.10.10.76

perl finger-user-enum.pl -U ../../SecLists/Usernames/Names/names.txt -t 10.10.10.76

finger root@10.10.10.76
Enumerating Squid Proxy

nikto -h 10.10.10.10 -useproxy http://10.10.10.10:3128

get /etc/squid/squid.conf
get /etc/squid/squid.cgf
get /etc/squid/squid.config
Set a profile in foxy proxy to change to the squid proxy and add creds in it to access it properly. 


Burp Settings:

add upstream proxy --> 

destination: * 
host : IP_ADDRESS
port : 3128
Authentication type: Basic
Username: creds
Password: creds

Set foxyproxy to use burp

Go to proxy --> options --> Proxy listeners --> Add
Bind it to port: 80
Request handling  --> redirect to 127.0.0.1 & 80 
Droppescan Usage - Drupal Scan

./droopescan scan drupal -u 10.10.10.9 
File Transfer to Windows Webserver 

python /impacket/build/scripts-3.7/smbserver.py bhanu ~/Desktop/HTB/

SNMP Enum -- > Checklist
 Windows Version Information 


dig axfr @10.10.10.123 friendzoneportal.red

cat zonetransfer | grep friendzone | grep IN | awk '{print $1}' | sed 's/\.$//g' | sort -u > hosts
Mount a SMB Share when you have Credentials 

 mount -t cifs -o username=Finance,password=Acc0unting //10.10.10.59/ACCT /mnt/smb/


cd /mnt/smb/         //we can see the mounted data here
  
cp -r smb ~/Desktop/HTB/tally/     //Copy all the files to your drive
Iterate a number from 1 to 20 in the given Variable and check the difference 

 for i in $(seq 1 20); do echo -n "$i: "; curl -s http://10.10.10.10/index.php/jobs/apply/$i/ | grep '<title>';done
curl 10.11.1.71 -s -L | grep "title\|href" | sed -e 's/^[[:space:]]*//'    --> Get all the links from a page 
curl 10.11.1.71 -s -L | html2text -width '99' | uniq 

--> get Text in much better readable Format 
gobuster -u http://10.11.1.71/ -w /usr/share/seclists/Discovery/Web_Content/cgis.txt -s '200,204,403,500' -e -x php
-->URL Brute forcing using Different word list and filtering with status codes
searchsploit --colour -t php 5.x | grep -v '/dos/' | grep -iv '\.php[^$]'

--> Search for PHP exploits using searchsploit ; remove .php unwanted files
Access a Binary from anywhere 

ln -s /root/Downloads/Tools/dirsearch/dirsearch.py /usr/local/bin/


#Change the binary location
echo $SHELL                  /Determine the shell
Download all the files from a FTP Directory using wget

wget --mirror 'ftp_user:password@10.10.10.10'  

Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512