hack_postconnect_infogathering
This is an old revision of the document!
Table of Contents
Intro
Post-Connection Attacks: After you connect to a newtork…
- Download a practice VM: Win10
- Make sure to create and use a snapshot of that VM so you can reset by creating a new snapshot from the original VM when the time runs out.
Info Gathering: Find out what is attached to the network: IP, MAC, OS, Ports, Services…
Tools: Tools: netdiscover (simple) and nmap (more detailed)
- After you get your feet wet with nmap, read The Book.
NetDiscover
netdiscover: quickly discover all devices connected to our network…
netdiscover -r 192.168.0.1/24 # -r sets range, /24 gives entire subnet
Provides:
- IP Address
- MAC Address
- Vendor Info
ZenMap
Nmap
hack_postconnect_infogathering.1590946208.txt.gz · Last modified: by gman