How I met your shell
CtrlK
CPTS
CPTS
  • From beginners to beginners
  • Introduction & Getting Started
    • Shells & SSH
      • Setting up Shells
    • Knowledge Check
  • Enumeration & Attack Planning
    • Nmap
      • Host Discovery
      • Port Scanning
      • IDS/IPS Evasion
      • NSE
      • Skill Assessments
    • Footprinting
      • Infrastructure-Based Enumration
        • Domain Information
        • Cloud Resources
      • Host-Based Enumeration
        • (21)FTP
        • (139,445)SMB
        • (111,2049 for NFSv4.1)NFS
        • SMTP(25/465(enc)/587(newer))
        • DNS
        • (143,993)IMAP/POP3(110,995)
        • (161 UDP)SNMP
        • (3306)MySQL
        • (1433)MSSQL
        • (1521)Oracle TNS
        • (623 UDP)IPMI
      • Skill Assessments
    • Information Gathering - Web Edition
      • WHOIS
      • DNS & Subdomains
        • Digging DNS
        • Subdomains & VHosts
      • More Fingerprinting
      • Crawling
    • Password Attacks
      • John The Ripper
      • Misc
      • Local Windows Password Attacks
      • Linux PtT
      • Windows PtT
  • Exploitation & Lateral Movement
    • Web Shells & Payloads
      • Skill Assessment
    • Metasploit
      • Modules, targets
      • External Modules
      • Plugins & Mixins
      • Databases
      • Sessions & Jobs
      • Payloads
      • Encoders
      • msfvenom
      • Meterpreter
  • Post exploitaion
    • File Transfers
      • Linux File Transfer Methods
      • Windows File Transfer Methods
      • Transferring Files with Code
  • Reporting
    • In-Progress...
  • Malware Analysis Prep
Powered by GitBook
On this page
  1. Enumeration & Attack Planning
  2. Footprinting

Host-Based Enumeration

Other than the infrastracture-based enumeration and reconnaissance, we will need to really footprint, or in other words, active reconnaissance. We will deal with protocols running on the target host, available ports and endpoints available for us.

PreviousCloud ResourcesNext(21)FTP

Last updated 7 months ago