Initial Enumeration

DNS Lookup

Step 1: Query the Domain Name System

nslookup ns1.inlanefreight.com

Queries the domain name system to discover the IP address to domain name mapping of the target from a Linux-based host.

Network Packet Capture

Step 1: Start Capturing Packets

sudo tcpdump -i ens224

Starts capturing network packets on the network interface specified after the -i option on a Linux-based host.

LLMNR, NBT-NS, and MDNS Analysis

Step 1: Start Responder in Passive Mode

sudo responder -I ens224 -A

Starts responding to and analyzing LLMNR, NBT-NS, and MDNS queries on the specified interface (-I ens224) in Passive Analysis mode (-A). Performed from a Linux-based host.

Network Ping Sweep

Step 1: Perform a Ping Sweep

fping -asgq 172.16.5.0/23

Performs a ping sweep on the specified network segment from a Linux-based host.

Nmap Network Scanning

Step 1: Perform an Advanced Nmap Scan

sudo nmap -v -A -iL hosts.txt -oN /home/User/Documents/host-enum

Performs an Nmap scan with OS detection, version detection, script scanning, and traceroute enabled (-A) based on a list of hosts (hosts.txt) specified with -iL. Outputs results to the file specified with -oN. Performed from a Linux-based host.

Kerbrute Enumeration

Step 1: Clone the Kerbrute Repository

sudo git clone https://github.com/ropnop/kerbrute.git

Uses Git to clone the Kerbrute tool from a Linux-based host.

Step 2: List Compiling Options

make help

Lists compiling options that are possible with make from a Linux-based host.

Step 3: Compile Kerbrute Binary

sudo make all

Compiles a Kerbrute binary for multiple OS platforms and CPU architectures.

Step 4: Test the Compiled Kerbrute Binary

./kerbrute_linux_amd64

Tests the chosen compiled Kerbrute binary from a Linux-based host.

Step 5: Move Kerbrute Binary to System Path

sudo mv kerbrute_linux_amd64 /usr/local/bin/kerbrute

Moves the Kerbrute binary to a directory in the Linux user's path, making it easier to use the tool.

Step 6: Enumerate Usernames with Kerbrute

./kerbrute_linux_amd64 userenum -d INLANEFREIGHT.LOCAL --dc 172.16.5.5 jsmith.txt -o kerb-results

Runs the Kerbrute tool to discover usernames in the domain (INLANEFREIGHT.LOCAL) specified with -d and the associated domain controller specified with --dc using a wordlist. Outputs (-o) the results to a specified file. Performed from a Linux-based host.

Last updated