Enumeration Flashcards
Enumeration extracted information such as:
- network shares
- network resources
- routing tables
- audit and service settings
- SNMP & DNS details
- Machine names
- Users & groups ( and user last log in)
- Application and banners
Enumeration techniques are conducted in what type of environment?
intranet
What is enumeration?
The attacker creates an active connection to a vulnerable system and performs direct queries to gain info about the target
Attacker then uses the info to 1- identify system attack points and 2- perform password attacks, to gain unauthorized acess
list some services and ports to enumerate
TCP port 25: SMTP TCP port 53: DNS transfer zone TCP port 21: FTP TCP port 23: telenet TCP 135 : used by email client to connect to email services (RPC) Remote Procedure Call TCP 138: NetBIOS datagram service TCP 137: NetBIOS name service TCP 139: NetBIOS session service TCP/UDP 445 SMB (service message block ) UDP 161: SNMP network mangment protocol
What is SMB protocol?
SIMPLE MESSAGE BLOCK is a microsoft application layer protocol for file and print sharing functions for LAN manger
What is NBSS (NetBIOS session service)?
is a method to connect two computers for transmitting large messages ( located in session layer)
what is NetBIOS?
is a program that allows applications on a different computers to communicate within a LAN
explian what is NetBIOS name and what it is consists of?
is a unique 16 ASCII character string used to identify the network devices
first 15 char: device name
the 16th char: service type
Attackers use NetBIOS ro obtain what info?
- list of computers that belong to a domain
- list of shares on the individual hosts (in the network)
- polices and passwords
what is RPC? and what port?
Remote procedure call an interprocess communication mechanism allows a program running on one host to run code on a remote host. uses port 135 tcp
What commands can be used for NetBIOS emmunartion?. mention for win and linux
Windows:
nbtstat -a [ip]
Linux:
nbtscan [ip]
or
nmblookup -A
what happens when you use firweall rules for port 137?
when you use nbtstat or nbtscan it will show that the hst is not uo ( it has been blocked by the firewall)
what is a NULL session attack?
uses vulnerblity in SMB for creating connection, by default they areenabled in windows 2000 and windows NT
why is a null session attack possible?
because it uses SMB that has trust for any kind of relationship between devices in a network
what command to establish null session? in win and Linux
windows: net
net use \[ip]\IPC$ “ “ /u:” “
Linux: smbclient
smbclient -L [ip]