Network Attacks

Seclists

SecLists is a great list containing common usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and more.

apt-get install seclists

Hydra

Hydra is a fast, parallelized, network authentication cracker that supports different protocols.

hydra -L <users file> -P <password file> -t 10 <target> ssh -s 22
hydra -L <users file> -P <password file> telnet://<target>

Windows Shares

NetBIOS can supply some of the following information when querying a computer:

  • Hostname

  • NetBIOS name

  • Domain

  • Network Shares

Badly configured shares exploitation can lead to:

  • Information disclosure

  • Unauthorized file access

  • Information leakage used to mount a target attack

Null session attacks can be used to enumerate a lot of information. Attackers can steal information about:

  • Passwords

  • System users

  • System Groups

  • Running system processes

By default enum4linux performs:

  • User enumeration

  • Share enumeration

  • Group and member enumeration

  • Password policy extraction

  • OS information detection

  • A nmblookup run

  • Printer information extraction

ARP Poisoning/Spoofing (Dsniff)

ARP Poisoning is a powerful attack you can use to intercept traffic on a switched network.

Metasploit

Metasploit is an open-source framework used for penetration testing and exploit development.

Metasploit gives you a wide array of commuunity contributed exploits and attack vectors that can be used against various systems and technoologies.

Basic workflow to exploit a target using MSFConsole:

  • Identifying a vulnerable service

  • Searching for a proper exploit for that service

  • Loading and configuring the exploit

  • Loading and configuring the payload you want to use

  • Running the exploit code and getting access to the vulnerable machine

Payloads are pieces of code injected by an exploit module into the victim machine or service.

A payload is used by an attacker to get:

  • An OS Shell

  • A VNC or RDP connection

  • A Meterpreter shell

  • The execution of an attacker-supplied application

Meterpreter

Meterpreter is a very powerful shell which runs on Android, BSD, Java, Linux, PHP, Python, and Windows vulnerable applications and services.

Meterpreter is more than a simple shell. It provides advanced features to gather information, transfer files between the attacker and victim machines, install backdoors and more.

Meterpreter lets you perform information gathering on the exploited machine and the network it is attached to. You can retrieve:

  • Information about the machine and the OS

  • The network configuration in use

  • The routing table of the compromised host

  • Information about the user running the exploited process

Last updated

Was this helpful?