Scanning for Hosts
Before we can pivot into other networks, we need to perform some recon and discover other hosts on our network.
Using the proper port scanning methodology when scanning for hosts is incredibly important. Port scanning is intrusive in nature, and can often have adverse affects. It is important to take your time and be cautious while performing host checks.
Netcat
Nmap
We should start by scanning the network for specific ports. Here are some initial ports:
Web Servers -
80 and 443
SMB File Shares -
139 and 445
.RDP -
3388-3390
.
Scanning Subnet:
Ping Sweep
For Loop on Linux Jump Host:
For Loop Using CMD
For Loop Using Powershell
Note: Windows defender defaults to blocking ICMP packets. Additionally, ping sweeps should be carried out at least 2 times to get an effective scope of the network.
Meterpreter
If we have a meterpreter session, we can perform:
Last updated