• Complain

Songer - Offensive Security: Enumeration

Here you can read online Songer - Offensive Security: Enumeration full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Independently published;Amazon Digital Services LLC - Kdp Print Us, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Songer Offensive Security: Enumeration
  • Book:
    Offensive Security: Enumeration
  • Author:
  • Publisher:
    Independently published;Amazon Digital Services LLC - Kdp Print Us
  • Genre:
  • Year:
    2018
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Offensive Security: Enumeration: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Offensive Security: Enumeration" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Need to know Enumeration.

Songer: author's other books


Who wrote Offensive Security: Enumeration? Find out the surname, the name of the author of the book and a list of all author's works by series.

Offensive Security: Enumeration — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Offensive Security: Enumeration" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Offensive Security: Enumeration
Austin Songer
Offensive Security: Enumeration
Austin Songer
ISBN: 9781728959320 This version was published on 2018-10-18 2018 Austin Songer Contents DNS Enumeration DNS offers a variety of - photo 1 2018 Austin Songer
Contents

DNS Enumeration
DNS offers a variety of information about public (and sometimes private!) organization servers, suchas IP addresses, server names, and server functionality. Interacting with a DNS Server > host -t ns megacorpone.com # -t : type , ns: dns > host -t mx megacorpone.com # mx : mail server Also you can use nslookup > nslookup anasboureada.comdig also can be used > dig aboureada.comAutomating lookups we have some initial data from the megacorpone.com domain, we can continue to use additionalDNS queries to discover more host names and IP addresses belonging to megacorpone.com. > host www.megacorpone.com > host idontexist.megacorpone.com # we will found that it has an ip# this is not found Forward Lookup Brute Force Taking the previous concept a step further, we can automate the Forward DNS Lookup of commonhost names using the host command and a Bash script.

> echo www > list.txt
> echo ftp >> list.txt
> echo mail >> list.txt
> echo owa >> list.txt
> echo proxy >> list.txt
> echo router >> list.txt
> echo api >> list.txt
> for ip in $( cat list.txt ) ; do host $ip .megacorpone.com; done

Reverse Lookup Brute Force
If the DNS administrator of megacorpone.com configured PTR records for the domain, we mightfind out some more domain names that were missed during the forward lookup brute-force phase. > for ip in $( seq 155 190 ) ; do host .7.67. $ip ; done | grep -v "not found" # grep -v :: --invert-match DNS Zone Transfers

A zone transfer is similar to a database replication act between related DNS servers. Thisprocess includes the copying of the zone file from a master DNS server to a slave server.The zone file contains a list of all the DNS names configured for that zone. Zone transfersshould usually be limited to authorized slave DNS servers.

> host -l megacorpone.com ns1.megacorpone.com # ns1 refused us our zone transfer r\
equest and -l :: list all hosts in a domain
3
4 # The result is a full dump of the zone file for the megacorpone.com domain,
# providing us a convenient list of IPs and DNS names for the megacorpone.com domain.
6
7 > host -t axfr zonetransfer.me nsztm1.digi.ninja.
8
9 > dig axfr nsztm1.digi.ninja zonetransfer.me

Now Lets automate the process: To get the name servers for a given domain in a clean format, we can issue the followingcommand.

```Bash
> host -t ns megacorpone.com | cut -d " " -f 4
# -d :: --delimiter=DELIM ;
# -f :: --fields=LIST select only these fields on each line;
```

Taking this a step further, we could write the following simple Bash script to automatethe procedure of discovering and attempting a zone transfer on each DNS server found.

```Bash
# /bin/bash
if [-z "$1" ]; then # $1 is the first argument given after the bash script
echo "[-] Simple Zone transfer script"
echo "[-] Usage : $0 "
exit 0
fi
8
9 for server in $(host -t ns $1 | cut -d" " -f4);do # if argument was given, ident\ ify the DNS servers for the domain
host -l $1 $server | grep "has address" # For each of these servers, attempt a zone \ transfer
done
```

Running this script on megacorpone.com should automatically identify both name serversand attempt a zone transfer on each of them

```Bash
chmod 755 dns- -axfr.sh
./dns- -axfr.sh megacorpone.com
```

Relevant Tools in Kali Linux
DNSRecon
> dnsrecon -d megacorpone.com -t axfr

-d :: domain
-t :: type of Enumeration to perform
axfr :: test all ns servers for zone transfer

DNSEnum> dnsenum zonetransfer.mefierce> pip3 install fierce> fierce --domain zonetransfer.meNMAP DNS Hostnames Lookup nmap -F --dns-serverHost Lookup host -t ns [megacorpone.com](http://megacorpone.com/)Reverse Lookup Brute Force - find domains in the same range for ip in $(seq 155 190);do host 50.7.67.$ip;done |grep -v "not found"Perform DNS IP Lookup dig a [domain-name-here.com](http://domain-name-here.com/) @nameserverPerform MX Record Lookup dig mx [domain-name-here.com](http://domain-name-here.com/) @nameserverPerform Zone Transfer with DIG dig axfr [domain-name-here.com](http://domain-name-here.com/) @nameserverDNS Zone Transfers
Windows DNS zone transfer
nslookup -> set type=any -> ls -d [blah.com ](http://blah.com/)Linux DNS zone transfer dig axfr [blah.com](http://blah.com/) @[ns1.blah.com](http://ns1.blah.com/)Dnsrecon DNS Brute Force dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xmlDnsrecon DNS List of megacorp dnsrecon -d [megacorpone.com](http://megacorpone.com/) -t axfrDNSEnum dnsenum zonetransfer.m
File Enumeration
Find UID 0 files root execution
/usr/bin/find / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \\\\\ ; 2>/dev/null
Get handy linux file system enumeration script (/var/tmp)

wget
chmod +x ./linux-local-enum.sh
./linux-local-enum.sh

Find executable files updated in August
find / -executable -type f 2> /dev/null | egrep -v "^/bin|^/var|^/etc|^/usr" | xargs\ls -lh | grep Aug
Find a specific file on linux
find /. -name suid\\\*\\
Find all the strings in a file
strings
Determine the type of a file
file
HTTP Enumeration
Search for folders with gobuster:
gobuster -w /usr/share/wordlists/dirb/common.txt -u $ip
Dirb - Directory brute force finding using a dictionary file
OWasp DirBuster - Http folder enumeration - can take a dictionary file dirb http://$ip/ wordlist.dict dirb <>
Dirb against a proxy
dirb [http://$ip/](http://172.16.0.19/) -p $ip:3129
Nikto
nikto -h $ip
HTTP Enumeration
nmap --script=http-enum -p80 -n $ip/24
Nmap Check the server methods
nmap --script http-methods --script-args http-methods.url-path='/test' $ip
Get Options available from web server
curl -vX OPTIONS vm/test
Uniscan directory finder:
uniscan -qweds -u <>
Wfuzz - The web brute forcer

wfuzz -c -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?FUZZ=test
wfuzz -c --hw 114 -w /usr/share/wfuzz/wordlist/general/megabeast.txt $ip:60080/?page\
=FUZZ
wfuzz -c -w /usr/share/wfuzz/wordlist/general/common.txt "$ip:60080/?page=mailer&mai\
l=FUZZ"
wfuzz -c -w /usr/share/seclists/Discovery/Web_Content/common.txt --hc 404 $ip/FUZZ

Recurse level 3
wfuzz -c -w /usr/share/seclists/Discovery/Web_Content/common.txt -R 3 --sc 200 $ip/F\ UZZ
Open a service using a port knock (Secured with Knockd)
for x in 7000 8000 9000; do nmap -Pn --host_timeout 201 -max-retries 0 -p $x server_\ ip_address; done
WordPress Scan - Wordpress security scanner
wpscan --url $ip/blog --proxy $ip:3129
RSH Enumeration - Unencrypted file transfer system
auxiliary/scanner/rservices/rsh_login
Finger Enumeration
finger @$ip finger batman@$ip
TLS & SSL Testing
./testssl.sh -e -E -f -p -y -Y -S -P -c -H -U $ip | aha > OUTPUT-FILE.html
Proxy Enumeration (useful for open proxies)
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Offensive Security: Enumeration»

Look at similar books to Offensive Security: Enumeration. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Offensive Security: Enumeration»

Discussion, reviews of the book Offensive Security: Enumeration and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.