📶Network Attacks
Last updated
Was this helpful?
Last updated
Was this helpful?
Brute Force mostly is never used hence why we focus on online Dictionary attacks.
One Helpful tool is Hydra:
hence why you need a really good set of password lists:
NetBIOS can provide when querying a computer following info:
Host name.
NetBIOS name. (via UDP)
Domain.
Network Shares.
[pre WinXP] NetBIOS is a non-routable OSI Session Layer 5 Protocol and a service that allows applications on computers to communicate with one another over a local area network (LAN). - Today we have NBT (NetBIOS over TCP/IP) now we can route.
Review SMB vs NetBIOS/NBT here. Hint: SMB does rely on NetBIOS for communication with devices that do not support direct hosting of SMB over TCP/IP.
NetBIOS is completely independent from SMB. It is an API that SMB, and other technologies can use, so NetBIOS has no dependency to SMB.
type it in path input in the File explorer.
Null session attack: exploit a vulnerability within Windows Administrative Share (which can't be deleted but can have auth.) this allows an attacker to connect to a local/remote share without authentication.
Enumerate Windows Shares.
Check for Null Sessions.
Exploit Null Session.
NBTStat (Win command tool display info about target).
To know if file sharing is Up and runing:
NET VIEW:(Win enum) after knowing it's running time to enum the shares.
Nmblookup: (Linux Enum) provided by the Samba suite.
Smbclient: (Linux Enum) also available with Samba Suite to Enum Shares and other things.
Notice SMBclient shows more results, Admin$ shares that were not shown by the other prev. tools.
We will exploit the IPC$
Administrative share by trying to connect without valid credentials.
this tells Windowds to conn. to IPC$ with empty Username/Password. \\<IP>\IPC$ following the UNC path standard.
same thing with SMBclient:
can be done also the same NET command but we will use Win/Linux tools to Automate.
ENUM: (Win tool, must download it) enumerate Admin shares as well.
Checking password policy before running Auth Attack lets you fine-tune tools to: - Prevent accounts locking. - prevents false positives. - choose your Dict/BruteForce config. (knowing min/max length of pass)
Winfo: another Win tool to attack null sessions.
-n tell the tool to use null sessions.
Enum4linux: Linux PERL script that can do the prev. two tools + more.
get -U user list & -o OS info for IP target.
to carry all the 3 phases:
samrdump.py: comes with kali does the same thing. (gives extra info)
Nmap: can also do the same thing after knowing shares running.
smbclient : Access the share:
Great SMB Enumeration tutorial full of tools.
https://www.hackingarticles.in/a-little-guide-to-smb-enumeration/
happen when: Attacker Send gratuitous ARP relies (ARP replies without actually asking) to the target thus changing the ARP cache for all victims so they forward the packet to the attacker. Then attacker can alter/forward the packet which means attacker now got Man-In-The-Middle Attack.
Dsniff: collection of tools for network auditing and Pen Testing. it includes arpspoof. install it:
-i: NIC to use eth0 or tap0..etc taget/host are victim IP (you want to be in middle of these two)
Tools:
EgressCheck Framework: check for the open outbound port.
Egress filtering (aka outbound filtering): controls the traffic that is attempting to leave the network. Before an outbound connection is allowed, it has to pass the filter's rules (i.e. policies).
to use the tool:
you have to run it inside the Target machine providing the file you would like to stealthy steal/exif. (this generates DNS queries).
In your machine capture the DNS queries with Wireshark/tcpdump (better)
run the tool in your machine this time againts the captured pcap file to get the stolen file.
run the tool in your machine with appropriate commands and generate the command for the target shell [ex: powershell-cmd] it will give you a file to run on the target [ex: .batch for windows].
capture traffic:
Run the generated file in the target machine. (or use the outputted command).
when egress is done close tcpdump and run:
print results:
`