method_2_recon
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_2_recon [2022/12/31 00:24] – [[1] OSInt] gman | method_2_recon [2022/12/31 22:10] (current) – [SMTP] gman | ||
---|---|---|---|
Line 87: | Line 87: | ||
* This will dump all the metadata into Metadata Summary and Document Analysis | * This will dump all the metadata into Metadata Summary and Document Analysis | ||
* Have fun! | * Have fun! | ||
+ | |||
+ | ===== Routing Info ===== | ||
+ | |||
+ | Routing information is network information, | ||
+ | * You can find a list of them here: [[https:// | ||
---- | ---- | ||
Line 248: | Line 253: | ||
Example syntax: '' | Example syntax: '' | ||
+ | |||
+ | ===== SMTP ===== | ||
+ | |||
+ | **Simple Mail Transfer Protocol (SMTP):** A vintage email sending protocol. | ||
+ | * No much built in security. | ||
+ | * Runs on port 25. | ||
+ | |||
+ | You can gather info on SMTP by telnetting to the service port (25) and grabbing the banner information and then using [[https:// | ||
+ | |||
+ | < | ||
+ | telnet example.server.com 25 | ||
+ | |||
+ | # once connected, type: | ||
+ | VRFY [username] | ||
+ | # or | ||
+ | EXPN [user_alias] | ||
+ | </ | ||
+ | |||
+ | **Exploits: | ||
+ | * Connect (by telnet). Grab banner info (VRFY, EXPN). | ||
+ | * This should give you a clue as to the SMTP version on your target. | ||
+ | ===== SNMP ===== | ||
+ | |||
+ | You can use SNMP to gather information on a system //**if**// you have access to the system //**and**// you know the " | ||
+ | |||
+ | **Tools:** | ||
+ | - [[https:// | ||
+ | - [[http:// | ||
+ | |||
+ | < | ||
+ | # Example syntax for snmpwalk, assuming ' | ||
+ | snmpwalk -c public -v1 192.168.1.1 | ||
+ | </ | ||
+ | |||
---- | ---- |
method_2_recon.1672446262.txt.gz · Last modified: by gman