Network services 2
Enumerating and Exploiting More Common Network Services & Misconfigurations
Last updated
Was this helpful?
Enumerating and Exploiting More Common Network Services & Misconfigurations
Last updated
Was this helpful?
This room from describes a few more common Network Service vulnerabilities and misconfigurations.
NFS -
NFS = Network File System
It is used to share file and directories using network
Working method: client will request to mount directory. If client has permission, it will send 'file handle'
Method for enum -
Scan with nmap
Create mount point (directory) in the attacker machine
Command to connect with mount: mount -t nfs IP:share /tmp/mount/ -nolock
mount: Execute the mount command
-t nfs: type of device to mount. Here it is nfs
IP:share : the ip of the target and the share we want to mount
-nolock: not to use NLM locking
Example method for exploiting -
Get NFS access
Gain low privilege access
Upload bash executable to NFS share
Get a reverse shell / Enumerate for ssh key / Escalate privilege
SMTP -
Stands for - simple mail transfer protocol
It's verifies and sends outgoing mail
Works with POP/IMAP
POP (post office protocol) : simply downloads the inbox from mail server
IMAP (internet message access protocol) : this is to synchronize the current inbox
Two internal commands for SMTP -
VRFY: confirm the name of valid users
EXPN: this reveals the actual address of user and list of email
Hydra brute force gave the solution here: hydra -t 16 -l [USERNAME] -P [rockyou.txt location] -vV [Machine IP Addres] ssh
MySQL is not going to initial attack point. After getting initial access, it will help.
NFS pentest cheat sheet: