Linux
Info-sheet
Recon
Always start with a stealthy scan to avoid closing ports.
# Syn-scan
nmap -sS INSERTIPADDRESS
# Scan all ports, might take a while.
nmap INSERTIPADDRESS -p-
# Service-version, default scripts, OS:
nmap INSERTIPADDRESS -sV -sC -O -p 111,222,333
# Scan for UDP
nmap INSERTIPADDRESS -sU
unicornscan -mU -v -I INSERTIPADDRESS
# Connect to udp if one is open
nc -u INSERTIPADDRESS 48772
# Monster scan
nmap INSERTIPADDRESS -p- -A -T4 -sCPort 21 - FTP
Port 22 - SSH
Port 25
Port 69 - UDP - TFTP
Port 110 - Pop3
Port 111 - Rpcbind
Port 135 - MSRPC
Port 143 - Imap
Port 139/445 - SMB
Port 161/162 UDP - SNMP
Port 554 - RTSP
Port 1030/1032/1033/1038
Port 1521 - Oracle
Port 2049 - NFS
Port 2100 - Oracle XML DB
3306 - MySQL
Port 3339 - Oracle web interface
Port 80 - Web server
Password brute force - last resort
Port 443 - HTTPS
Vulnerability analysis
To try - List of possibilies
Find sploits - Searchsploit and google
Privilege escalation
To-try list
Useful commands
Basic info
Kernel exploits
Programs running as root
Installed software
Weak/reused/plaintext passwords
Inside service
Suid misconfiguration
Unmounted filesystems
Cronjob
SSH Keys
Bad path configuration
Loot
Proof
Network secret
Passwords and hashes
Dualhomed
Tcpdump
Interesting files
Databases
SSH-Keys
Browser
Mail
GUI
Last updated