Information Gathering
Network
Nmap
Scan a network
Press "v" if you forgot du add "-v" in the scan and need to increase verbosity.
- Simple IP scan:
nmap -sC -sV $ip
- Enumerate the SMB shares:
nmap -p 445 --script=smb-enum-shares.nse,smb-enum-users.nse $ip
ncat: todo
Scan MYSQL users
nmap -sV --script=mysql-info.nse,mysql-users.nse,mysql-enum.nse $IP -p 3306
sudo nmap -sU -sS --script smb-os-discovery.nse -p U:137,T:139 $IP
Scan SMB
Determine the operating system, computer name, domain, workgroup, and current time over the SMB protocol (ports 445 or 139). This is done by starting a session with the anonymous account.
nmap --script smb-os-discovery.nse -p445 $IP
Enumerate the users on a remote Windows system, through two different techniques (both over MSRPC, which uses port 445 or 139; see smb.lua). The goal of this script is to discover all user accounts that exist on a remote system.
sudo nmap -sU -sS --script smb-enum-users.nse -p U:137,T:139 $IP
SSH Auth
Returns authentication methods that a SSH server supports.
nmap -p 22 --script ssh-auth-methods --script-args="ssh.user=<username>" $IP
Dnscan
wordlist-based DNS subdomain scanner
sudo apt install python3-dnspython
sudo git clone https://github.com/rbsec/dnscan /opt/dnscan
sudo pip install -r /opt/dnscan/requirements.txt
sudo ln -s /opt/dnscan/dnscan.py /usr/local/bin/dnscan.py
Run example:
./dnscan.py -d dev-%%.example.org
Website
Always check the robots.txt :)
GoBuster
Find dirs that work
- Source: https://github.com/OJ/gobuster
- Install:
sudo apt-get install gobuster
Example:
gobuster dir -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -u 10.10.112.131
gobuster dir -w /usr/share/SecLists/Discovery/Web-Content/big.txt -u 10.10.225.77
gobuster dir -w /usr/share/wordlists/dirb/common.txt -u 10.10.225.77
Dirbuster
When running dirbuster command, you can provide the "-r" option to tell dirbuster to not be recursive, resulting in a faster search.
Database
SQLMap
SQLMap
Social
Reposcanner
sudo apt install python3-git
sudo git clone https://github.com/dionach/reposcanner /opt/reposcanner
ln -s /opt/reposcanner/reposcanner.py /usr/local/bin/reposcanner.py
Run example:
reposcanner.py -r https://github.com/FullByte/FullByte.github.io
Photon (web crawler)
https://github.com/s0md3v/Photon
TODO
Cloud
ScoutSuite (AWS, Azure, GCP)
git clone https://github.com/nccgroup/ScoutSuite /opt/scoutsuite
cd /opt/scoutsuite
virtualenv -p python3 venv
. venv/bin/activate
pip3 install -r requirements.txt
pip3 install azure-cli
cat <<EOT > /usr/local/bin/scout.sh
#!/bin/sh
. /opt/scoutsuite/venv/bin/activate > /dev/null 2>&1 && /opt/scoutsuite/scout.py $@
EOT
chmod +x /usr/local/bin/scout.sh
exit
Prowler (AWS)
pip3 install ansi2html detect-secrets
git clone https://github.com/toniblyx/prowler /opt/prowler