Network services 2

Enumerating and Exploiting More Common Network Services & Misconfigurations

This room from tryHackMe describes a few more common Network Service vulnerabilities and misconfigurations.

Task 2: Understanding NFS

NFS -

  • NFS = Network File System

  • It is used to share file and directories using network

  • Working method: client will request to mount directory. If client has permission, it will send 'file handle'

Task 3: Enumerating NFS

Method for enum -

  • Scan with nmap

  • Create mount point (directory) in the attacker machine

  • Command to connect with mount: mount -t nfs IP:share /tmp/mount/ -nolock

    • mount: Execute the mount command

    • -t nfs: type of device to mount. Here it is nfs

    • IP:share : the ip of the target and the share we want to mount

    • -nolock: not to use NLM locking

Task 4: Exploiting NFS

NFS pentest cheat sheet: hackTricks

Example method for exploiting -

  • Get NFS access

  • Gain low privilege access

  • Upload bash executable to NFS share

  • Get a reverse shell / Enumerate for ssh key / Escalate privilege

Task 5: Understanding SMTP

SMTP -

  • Stands for - simple mail transfer protocol

  • It's verifies and sends outgoing mail

  • Works with POP/IMAP

    • POP (post office protocol) : simply downloads the inbox from mail server

    • IMAP (internet message access protocol) : this is to synchronize the current inbox

Task 6: Enumerating SMTP

Two internal commands for SMTP -

  • VRFY: confirm the name of valid users

  • EXPN: this reveals the actual address of user and list of email

Task 7: Exploiting SMTP

Hydra brute force gave the solution here: hydra -t 16 -l [USERNAME] -P [rockyou.txt location] -vV [Machine IP Addres] ssh

Task 8: Understanding MySQL

Task 9: Enumerating MySQL

MySQL is not going to initial attack point. After getting initial access, it will help.

Task 10: Exploiting MySQL

Last updated

Was this helpful?