Network
Network
Common ports
No Service | |
---|---|
21 | FTP |
22 | SSH |
23 Tel net |
|
25 | SMTP |
49 | TACACS |
53 DNS |
|
8/67 DHCP (UDP) |
|
69 TFTP (UDP) |
|
80 | HTTP |
88 Kerberos |
|
110 | POP3 |
111 RPC |
|
123 NTP (UDP) |
|
135 | Windows RPC |
137 NetBIOS |
|
138 | NetBIOS |
139 | SMB |
143 IMAP |
|
161 SNMP (UDP) |
|
179 | BGP |
201 Apple Talk |
|
389 LDAP |
|
443 HTTPS |
|
445 | SMB |
500 | ISAKMP (UDP) |
514 Syslog |
|
520 | R.I.P |
7/546 DHCPv6 |
|
587 SMTP |
|
902 VMware |
|
1080 | Socks Proxy |
1194 | VPN |
1433/4 MS-SQL |
|
1521 | Oracle |
1629 | DarneWare |
2049 | NFS |
3128 | Squid Proxy |
3306 | MySQL |
3389 | RDP |
5060 | SIP |
5222 | Jabber |
5432 | Postgres |
5666 | Nagios |
5900 | VNC |
6000 | X11 |
6129 | DameWare |
6667 | IRC |
9001 | Tor |
9001 | HSQL |
9090/1 Open fire |
|
9100 | Jet Direct |
Get operating system information with TTL
os | size |
---|---|
Windows | 128 |
Linux | 64 |
| 255 |
Solaris | 255 |
ftp status codes
situation | code |
---|---|
Waiting for user login 220 |
|
Not authenticated 530 |
|
http status codes
situation | code |
---|---|
Successful connection 200 |
|
Lack of access 403 |
|
IPV4 information
Classful range
name | start | end |
---|---|---|
A 0.0.0.0 | 127.255.255.255 |
|
B 128.0.0.0 | 191.255.255.255 |
|
C | 192.0.0.0 | 223.255.255.255 |
D 224.0.0.0 | 239.255.255.255 |
|
E | 240.0.0.0 | 255.255.255.255 |
Range Reversed
start | end |
---|---|
10.0.0.0 | 10.255.255.255 |
127.0.0.0 | 127.255.255.255 |
172.16.0.0 | 172.31.255.255 |
192.168.0.0 | 192.168.255.255 |
Subnetting
/31 | 255.255.255.254 | 1 Host |
/30 | 255.255.255.252 | 2 Hosts |
/29 | 255.255.255.248 | 6 Hosts |
/28 | 255.255.255.240 | 14 Hosts |
/27 | 255.255.255.224 | 30 Hosts |
/26 | 255.255.255.192 | 62 Hosts |
/25 | 255.255.255.128 | 126 Hosts |
/24 | 255.255.255.0 | 254 Hosts |
/23 | 255.255.254.0 | 510 Hosts |
/22 | 255.255.252.0 | 1022 Hosts |
/21 | 255.255.248.0 | 2046 Hosts |
/20 | 255.255.240.0 | 4096 Hosts |
/19 | 255.255.224.0 | 8190 Hosts |
/18 | 255.255.192.0 | 16382 Hosts |
/17 | 255.255.128.0 | 32766 Hosts |
/16 | 255.255.0.0 | 65534 Hosts |
/15 | 255.254.0.0 | 131070 Hosts |
/14 | 255.252.0.0 | 262142 Hosts |
/13 | 255.248.0.0 | 524286 Hosts |
/12 | 255.240.0.0 | 1048574 Hosts |
/11 | 255.224.0.0 | 2097150 Host |
/10 | 255.192.0.0 | 4194302 Host |
/9 | 255.128.0.0 | 8388606 Host |
/8 | 255.0.0.0 | 16777214 Hosts |
Calculate the subnet range
IPV6 information
Broadcast addresses
Interface addresses
ipv6 toolbox
port forward with chisel
Or
ipv6 tunnel in ipv4 with socat
Cisco commands
Command | Description |
---|---|
enable | Enable privilege mode |
#configure terminal | interface settings |
(config)#interface fa0/0 | Configure FastEthernet 0/0 |
(config-if)#ip addr 1.1.1.1 255.255.255.0 | Set IP to fa0/0 |
(config)#line Vty 0 4 | set vty line |
(config-line)#login | Set telnet password |
(config-line)#password password | Set password for telnet |
#show session | reopen session |
#show version | IOS version |
#dir file systems | Available files |
#dir all-filesystems | File Information |
#dir /all | Delete files |
#show running-config | settings in memory |
#show startup-config | Settings inside boot |
#show ip interface brief | List of Interfaces |
#show interface e0 | interface information details |
#show ip route | List of Routes |
#show access-lists | Access Lists |
#terminal length 0 | No limit on output |
#copy running-config startup-config | Place settings from memory to boot |
#copy running-config tftp | Copy settings on tftp |
IOS 11.2-12.2 vulnerabilities
SVN
List of files and folders
activity reports
change list
Guess the password of OVA, O365, skype business
SNMP protocol
Need to start the tftp service
Windows executive services list
Windows open ports
Installed software
Windows users
Shared files
Listening with responder
Packet recording
Recording of port packets 22-23
Capture specific ip traffic other than subnet
Traffic recording 192.1
Timed recording of traffic
Check Reply PCAP
Checking Reply packets (FUZZ | Dos)
DNSRecon command
reverse dns lookup operation and checking the output with nmap
VPN
Write psk on the file
attack vpn server
Fiked - Create fake vpn server
Guess username with hydra
Display smb paths with smbclient
Accessing the system environment using WRM
Directing local traffic to a specified address
Putty software
Registry key to report any operation by putty (even commands and outputs)
ldap
Search for important ldap information using impackt
Display all ldap structural information
#ftp
Connect to ftp with username and password
Printers
Establish connection
Email sending and smtp password guessing
vnc
Decode the VNC Install.reg file
Oe
##CCTV
Data collection
Guess the password
Jack of all trades
SSH
connect to SSH service on the target
scan for open SSH port on the target
brute force SSH login
80 (HTTP)
retrieve content from the HTTP server on the target
scan for open HTTP port on the target
directory enumeration on the HTTP server
443 (HTTPS)
retrieve content from the HTTPS server on the target
scan for open HTTPS port on the target
perform SSL/TLS vulnerability scan on HTTPS server
21 (FTP)
connect to FTP service on the target
scan for open FTP port on the target
brute force FTP login
25 (SMTP)
connect to SMTP service on the target
scan for open SMTP port on the target
enumerate valid users on SMTP server
53 (DNS)
perform DNS lookup on the target
scan for open DNS port on the target
perform DNS enumeration on the target
110 (POP3)
connect to POP3 service on the target
scan for open POP3 port on the target
brute force POP3 login
143 (IMAP)
connect to IMAP service on the target
scan for open IMAP port on the target
brute force IMAP login
3306 (MySQL)
connect to MySQL service on the target
scan for open MySQL port on the target
perform SQL injection on MySQL database
3389 (RDP)
connect to RDP service on the target
scan for open RDP port on the target
brute force RDP login
5900 (VNC remote desktop)
connect to VNC service on the target
Last updated