Member-only story

Getting a foothold: An attack plan

Thexssrat
6 min readNov 20, 2021

--

Introduction

So now that you have seen some of the processes of enumeration, it’s time to introduce a plan of attack. Seeing these issues in isolation is good of course and I can’t give a general attack plan that will work in every setting but in general, you usually follow a very similar strategy. It all comes down to enumeration, enumeration, and more enumeration. You will notice I keep on talking about http but also to check https and any web app not running on the default ports (80,443). Anything can reside on non-default ports but it seems like offsec likes to host a lot of web apps on non default ports.

Nmap

Running Nmap is no black magic. You type “nmap host” and your scan is running but that is not all this magnificent tool, can you. I usually follow a strategy that looks like this (After installing the tool with the command “sudo apt-get install nmap”):

  • I start all my scans with -sC and -sV flags which slow down my scans but they give me vital information > “-sC” default scripts, “-sV” enumerate versions.
  • Add all UDP ports (-p-)
  • Add TCP ports (-U)
  • Full on all out scan on every port
  • -oA to output in nmap, grepable nmap and xml format.
  • Optionally, you could add a timing flag such as -T4 to control how aggressively nmap scans

By the time these scans are finished, you should be able to see at least something…

--

--

Thexssrat
Thexssrat

Written by Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

No responses yet