PRIMARY CATEGORY → CHECKLISTS

FTP

FTP

Non-Credentialed Enumeration

If so, then check [[#FTP#Credentialed Enumeration|FTP Credential Enumeration]]

Credentialed Enumeration

HTTP

HTTP

See Web Offensive Checklist


MYSQL

MYSQL

Outside

i.e. SQL Injection

See Web Offensive Checklist

Inside

i.e. After compromising a web application and establish a remote connection via Rev. Shell ( e.g. mysql cli tool )

e.g. A table named Users or Employees with Crackable Hashes


DNS

DNS

Non-Credentialed Enumeration
Credentialed Enumeration
  • Windows AD → DNS Records Dump using adidnsdump

SMB

Non-Credentialed Enumeration

SMB

See AD Offensive Checklist

  • Vulnerable SMB Version due to unpatched and outdated Windows Version

e.g. EternalBlue

If available, then check [[#SMB#Credentialed Enumeration|SMB Credentialed Enumeration]]

Credentialed Enumeration

RPC

RPC

See AD Offensive Checklist

Non-Credentialed Enumeration
  • Check RPC Null and Guest Authentication

If available, then check [[#RPC#Credentialed Enumeration|RPC Credentialed Enumeration]]

Credentialed Enumeration

LDAP

LDAP

See AD Offensive Checklist

Non-Credentialed Enumeration

If available, then check [[#LDAP#Credentialed Enumeration|LDAP Credentialed Enumeration]]

Credentialed Enumeration
  • Look for sensitive information within LDAP Objects

Plain passwords, keys, principals susceptible to ASREPRoast or Kerberoast and so on


MSSQL

MSSQL

See AD Offensive Checklist

e.g. Databases, Tables, Users, Procedures and so on

If none of those roles are assigned, then try enabling xp_cmdshell anyways, just in case

i.e. Read Files from a MSSQL Instance ⤴️

i.e. Write Files from a MSSQL Instance ⤴


RDP

RDP


WINRM

WINRM

  • WinRM Dictionary Attack and Password Spraying

  • PFX Certificate ( .x509 Format and a domain principal as UPN ) → Public and Private Key Extraction → [[5985, 5986 - WINRM#MS-PSRP#Evil-WinRM|WinRM Certificate Authentication]]


SMTP

SMTP


IMAP

IMAP

Non-Credentialed Enumeration
Credentialed Enumeration
  • Look for sensitive information ( Plain passwords, tokens… ) in any existing email message within the given INBOX

See Service Interaction


POP3

POP3

Non-Credentialed Enumeration
Credentialed Enumeration
  • Look for sensitive information ( Plain passwords, tokens… ) in any existing email message within the given INBOX

See here


NFS

NFS


SNMP

SNMP

Non-Credentialed Enumeration

If we get a hit and obtain the given community string, then check [[#SNMP#Credentialed Enumeration|SNMP Credentialed Enumeration]]

Credentialed Enumeration

REDIS

REDIS

It does not require authentication by default


RSYNC

RSYNC

Non-Credentialed Enumeration

If available, then check [[#RSYNC#Credentialed Enumeration|RSYNC Credentialed Enumeration]]

Credentialed Enumeration

e.g. rsyncd.conf, rsyncd.secrets…


Oracle TNS

Oracle TNS


IPMI

623 - IPMI