Network Attacks
Last updated
Was this helpful?
Last updated
Was this helpful?
is a great list containing common usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and more.
Hydra is a fast, parallelized, network authentication cracker that supports different protocols.
NetBIOS can supply some of the following information when querying a computer:
Hostname
NetBIOS name
Domain
Network Shares
Badly configured shares exploitation can lead to:
Information disclosure
Unauthorized file access
Information leakage used to mount a target attack
Null session attacks can be used to enumerate a lot of information. Attackers can steal information about:
Passwords
System users
System Groups
Running system processes
By default enum4linux performs:
User enumeration
Share enumeration
Group and member enumeration
Password policy extraction
OS information detection
A nmblookup run
Printer information extraction
ARP Poisoning is a powerful attack you can use to intercept traffic on a switched network.
Metasploit is an open-source framework used for penetration testing and exploit development.
Metasploit gives you a wide array of commuunity contributed exploits and attack vectors that can be used against various systems and technoologies.
Basic workflow to exploit a target using MSFConsole:
Identifying a vulnerable service
Searching for a proper exploit for that service
Loading and configuring the exploit
Loading and configuring the payload you want to use
Running the exploit code and getting access to the vulnerable machine
Payloads are pieces of code injected by an exploit module into the victim machine or service.
A payload is used by an attacker to get:
An OS Shell
A VNC or RDP connection
A Meterpreter shell
The execution of an attacker-supplied application
Meterpreter is a very powerful shell which runs on Android, BSD, Java, Linux, PHP, Python, and Windows vulnerable applications and services.
Meterpreter is more than a simple shell. It provides advanced features to gather information, transfer files between the attacker and victim machines, install backdoors and more.
Meterpreter lets you perform information gathering on the exploited machine and the network it is attached to. You can retrieve:
Information about the machine and the OS
The network configuration in use
The routing table of the compromised host
Information about the user running the exploited process