Network

Network

Common ports

No Service

21

FTP

22

SSH

23 Tel net

25

SMTP

49

TACACS

53 DNS

8/67 DHCP (UDP)

69 TFTP (UDP)

80

HTTP

88 Kerberos

110

POP3

111 RPC

123 NTP (UDP)

135

Windows RPC

137 NetBIOS

138

NetBIOS

139

SMB

143 IMAP

161 SNMP (UDP)

179

BGP

201 Apple Talk

389 LDAP

443 HTTPS

445

SMB

500

ISAKMP (UDP)

514 Syslog

520

R.I.P

7/546 DHCPv6

587 SMTP

902 VMware

1080

Socks Proxy

1194

VPN

1433/4 MS-SQL

1521

Oracle

1629

DarneWare

2049

NFS

3128

Squid Proxy

3306

MySQL

3389

RDP

5060

SIP

5222

Jabber

5432

Postgres

5666

Nagios

5900

VNC

6000

X11

6129

DameWare

6667

IRC

9001

Tor

9001

HSQL

9090/1 Open fire

9100

Jet Direct

Get operating system information with TTL

os
size

Windows

128

Linux

64

255

Solaris

255

ftp status codes

situation
code

Waiting for user login 220

Not authenticated 530

http status codes

situation
code

Successful connection 200

Lack of access 403

IPV4 information

Classful range

name
start
end

A 0.0.0.0

127.255.255.255

B 128.0.0.0

191.255.255.255

C

192.0.0.0

223.255.255.255

D 224.0.0.0

239.255.255.255

E

240.0.0.0

255.255.255.255

Range Reversed

start
end

10.0.0.0

10.255.255.255

127.0.0.0

127.255.255.255

172.16.0.0

172.31.255.255

192.168.0.0

192.168.255.255

Subnetting

/31

255.255.255.254

1 Host

/30

255.255.255.252

2 Hosts

/29

255.255.255.248

6 Hosts

/28

255.255.255.240

14 Hosts

/27

255.255.255.224

30 Hosts

/26

255.255.255.192

62 Hosts

/25

255.255.255.128

126 Hosts

/24

255.255.255.0

254 Hosts

/23

255.255.254.0

510 Hosts

/22

255.255.252.0

1022 Hosts

/21

255.255.248.0

2046 Hosts

/20

255.255.240.0

4096 Hosts

/19

255.255.224.0

8190 Hosts

/18

255.255.192.0

16382 Hosts

/17

255.255.128.0

32766 Hosts

/16

255.255.0.0

65534 Hosts

/15

255.254.0.0

131070 Hosts

/14

255.252.0.0

262142 Hosts

/13

255.248.0.0

524286 Hosts

/12

255.240.0.0

1048574 Hosts

/11

255.224.0.0

2097150 Host

/10

255.192.0.0

4194302 Host

/9

255.128.0.0

8388606 Host

/8

255.0.0.0

16777214 Hosts

Calculate the subnet range

IPV6 information

Broadcast addresses

Interface addresses

ipv6 toolbox

port forward with chisel

Or

ipv6 tunnel in ipv4 with socat

Cisco commands

Command
Description

enable

Enable privilege mode

#configure terminal

interface settings

(config)#interface fa0/0

Configure FastEthernet 0/0

(config-if)#ip addr 1.1.1.1 255.255.255.0

Set IP to fa0/0

(config)#line Vty 0 4

set vty line

(config-line)#login

Set telnet password

(config-line)#password password

Set password for telnet

#show session

reopen session

#show version

IOS version

#dir file systems

Available files

#dir all-filesystems

File Information

#dir /all

Delete files

#show running-config

settings in memory

#show startup-config

Settings inside boot

#show ip interface brief

List of Interfaces

#show interface e0

interface information details

#show ip route

List of Routes

#show access-lists

Access Lists

#terminal length 0

No limit on output

#copy running-config startup-config

Place settings from memory to boot

#copy running-config tftp

Copy settings on tftp

IOS 11.2-12.2 vulnerabilities

SVN

List of files and folders

activity reports

change list

Guess the password of OVA, O365, skype business

SNMP protocol

Need to start the tftp service

Windows executive services list

Windows open ports

Installed software

Windows users

Shared files

Listening with responder

Packet recording

Recording of port packets 22-23

Capture specific ip traffic other than subnet

Traffic recording 192.1

Timed recording of traffic

Check Reply PCAP

Checking Reply packets (FUZZ | Dos)

DNSRecon command

reverse dns lookup operation and checking the output with nmap

VPN

Write psk on the file

attack vpn server

Fiked - Create fake vpn server

Guess username with hydra

Display smb paths with smbclient

Accessing the system environment using WRM

Directing local traffic to a specified address

Putty software

Registry key to report any operation by putty (even commands and outputs)

ldap

Search for important ldap information using impackt

Display all ldap structural information

#ftp

Connect to ftp with username and password

Printers

Establish connection

Email sending and smtp password guessing

vnc

Decode the VNC Install.reg file

Oe

more info

##CCTV

Data collection

Guess the password

Jack of all trades

SSH

connect to SSH service on the target

scan for open SSH port on the target

brute force SSH login

80 (HTTP)

retrieve content from the HTTP server on the target

scan for open HTTP port on the target

directory enumeration on the HTTP server

443 (HTTPS)

retrieve content from the HTTPS server on the target

scan for open HTTPS port on the target

perform SSL/TLS vulnerability scan on HTTPS server

21 (FTP)

connect to FTP service on the target

scan for open FTP port on the target

brute force FTP login

25 (SMTP)

connect to SMTP service on the target

scan for open SMTP port on the target

enumerate valid users on SMTP server

53 (DNS)

perform DNS lookup on the target

scan for open DNS port on the target

perform DNS enumeration on the target

110 (POP3)

connect to POP3 service on the target

scan for open POP3 port on the target

brute force POP3 login

143 (IMAP)

connect to IMAP service on the target

scan for open IMAP port on the target

brute force IMAP login

3306 (MySQL)

connect to MySQL service on the target

scan for open MySQL port on the target

perform SQL injection on MySQL database

3389 (RDP)

connect to RDP service on the target

scan for open RDP port on the target

brute force RDP login

5900 (VNC remote desktop)

connect to VNC service on the target

Last updated