githubEdit

external-recon

#externalrecon

Tools

  • Pre2k - A tool for pre-windows 2000 compatibility enumeration (use p2k to find users with weak passwords)

  • BloodyAD - Active directory enumeration and exploitation tool

  • Kerbrute - A kerberos brute-force tool

  • Ensurepath - A tool for managing python-based applications

Engagement

What are we looking for?

IP Space

DNS Information

Public data

Other resource

Oversearching enumeration principles

  • Keep in mind that our goal is to understand our target better. We are looking for every possible venue. First we will use passive resource, and then active enumeration.

Google dorks

Username harvesting


Initial enumeration

Identify host and other hints

  • Tcpdump (no GUI)

  • Wireshark

  • Net-creds (no GUI)

  • netMiner (no GUI)

Capturing network traffic (monitor mode)

Active host check

Nmap scanning

Username enumeration (Internal AD) - brute force active directory accounts

  • User enumeration


Theory

LLMNR/NBT-NS poisoning

  • Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification that can be used when DNS fails. If a machine attempts to resolve a host but DNS resolution fails, typically, the machine will try to ask all other machines on the local network for the correct host address via LLMNR. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. It uses port 5355 over UDP natively. If LLMNR fails, the NBT-NS will be used. NBT-NS identifies systems on a local network by their NetBIOS name. NBT-NS utilizes port 137 over UDP.

LLMNR/NBT-NS are used for name resolution, any host on the local network can reply, this is where responder comes into play.

Detailed user enumeration - build a user list

A computer object is treated as a domain user account (with some differences, such as authenticating across forest trusts). If you don’t have a valid domain account, and SMB NULL sessions and LDAP anonymous binds are not possible, you can create a user list using external resources such as email harvesting and LinkedIn.

Last updated