Enumeration allows you to establish an active connection with a target. Your intent is to extract different types of information from the target. Some of the information that you can extract is:
Usernames
Group names
Hostnames
Network shares and services
Routing tables
Web application
Web servers
SNMP information
DNS information
There are various types of enumerations that can be performed. Some of these are:
Windows Enumeration
Linux Enumeration
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
In this exercise, you will learn to use some of the enumeration techniques using Windows-based tools.
Learning Outcomes
After completing this exercise, you will be able to:
Use SuperScan for NetBIOS Enumeration
Use Hyena for Enumeration
Perform LDAP Enumeration using Softerra LDAP Administrator
Perform SNMP Enumeration using IP Network Browser
Your Devices
You will be using the following devices in this lab. Please power these on now.
PLABDC01 - (Windows Server 2019 - Domain Server)
PLABDM01 - (Windows Server 2019 - Domain Member)
PLABWIN10 - (Windows 10 - Workstation)
PLABKALI01 - (Kali 2019.2 - Linux Kali Workstation)
Task 1 - Use SuperScan for NetBIOS Enumeration
SuperScan is a network management tool that has the following capabilities:
NetBIOS information
User and group accounts
Network shares
Services status
To use SuperScan, for NetBIOS enumeration perform the following steps:
Step 1
Ensure you have powered on all the devices listed in the introduction and connect to PLABWIN10. In the Type here to search text box, type the following:
Internet Explorer
From the search results, select Internet Explorer.
Step 2
Internet Explorer opens the Tools and resources webpage.
Click Tools.
Step 3
You will be directed to [..] > Tools.
Scroll down a bit and locate Hacking Tools.
Click Hacking Tools.
Step 4
On the [..] > Tools > Hacking Tools page, scroll down the page and locate superscan-4.1.zip.
Click superscan-4.1.zip.
Step 5
In the notification bar, click Save.
Step 6
When the file download is successfully completed, in the notification bar, click Open folder.
Step 7
File Explorer opens the Downloads folder that contains the superscan-4.1.zip file.
Right-click superscan-4.1 and select Extract All.
Step 8
In the Extract Compressed (Zipped) Folders dialog box, keep the default path and click Extract.
Step 9
A new File Explorer window opens with the extracted files. Double-click SuperScan4.1.
Step 10
The SuperScan 4.1 window is displayed.
In the SuperScan 4.1 window, click the Windows Enumeration tab.
Step 11
There are two panes in the Windows Enumeration tab. The left pane contains the Enumeration types, and the right pane will display the result of the enumeration. In the Hostname/IP/URL text box, type the following IP address:
192.168.0.1
Click Enumerate.
Step 12
The results are displayed in the right pane. Scroll up to view the results from the beginning.
Step 13
You can view the complete results by scrolling down.
Step 14
Using SuperScan, you can also perform a network scan.
From the SuperScan 4.1 window, select the Scan tab.
Step 15
On the Scan tab, in the Start IP text box, type the following IP address:
192.168.0.1
Click inside the End IP text box. Notice that the End IP text information is automatically populated with the following IP address:
192.168.0.254
Click the middle right arrow to add information in the right text box.
Step 16
The IP address range is now added in the right text box.
Step 17
Minimize the SuperScan 4.1 window and all other open windows.
Before proceeding, you will need to disable the firewall, click Start.
In the Type here to search text box, type the following:
Windows Defender Firewall with Advanced Security
Click on Windows Firewall with Advanced Security.
Step 18
The Windows Defender Firewall with Advanced Security window is displayed. You will notice that only the Domain Profile is Active, click Windows Defender Firewall Properties link in the middle pane.
Step 19
On the Windows Defender Firewall with Advanced Security on Local Computer Properties dialog box, the Domain Profile tab is displayed.
You need to change the Firewall state to Off. Click the Firewall state drop-down and select Off.
Step 20
After the Firewall state is set to Off, click the Private Profile tab.
Step 21
You need to change the Firewall state to Off. Click the Firewall state drop-down and select Off.
Step 22
After the Firewall state is set to Off, click the Public Profile tab.
Step 23
You need to change the Firewall state to Off. Click the Firewall state drop-down and select Off.
Step 24
After the firewall has been turned off on all three tabs, Domain Profile, Private Profile, and Public Profile, click OK.
Step 25
Close the Windows Defender Firewall with Advanced Security window.
Note: In a production environment, you would not do this as it exposes the device to a number of threats.
Step 26
Minimize PLABWIN10and connect to PLABDC01.
The Server Manager window is displayed. Click Close.
Step 27
Right-click the Windows charm and select Windows PowerShell (Admin).
Step 28
Using a PowerShell cmdlet, you will turn off the firewall on PLABDC01. You can turn off all three profiles using a single command. To do this, type the following command:
Notice that the command does not return any output. Windows Firewall is now switched off.
Step 30
To exit from the PowerShell window, type the following command:
exit
Press Enter.
Step 31
Minimize PLABDC01and connect to PLABDM01.
The Server Manager window is displayed. Click Close.
Step 32
Right-click the Windows charm and select Windows PowerShell (Admin).
Step 33
Using a PowerShell cmdlet, you will turn off the firewall on PLABDC01. You can turn off all three profiles using a single command. To do this, type the following command:
Notice that the command does not return any output. Windows Firewall is now switched off.
Step 35
To exit from the PowerShell window, type the following command:
exit
Press Enter.
Step 36
Switch back to PLABWIN10. Restore the SuperScan 4.1 window from the taskbar and click the Play button in the bottom section.
Step 37
Note that the network scan of the defined IP address range has started.
Once the scan is completed, and the progress bar has reached the end, a detailed report is displayed.
You need to read through the generated report by SuperScan.
Click the Tools tab to proceed to the next step.
Step 38
On the Tools tab, click inside the Hostname/IP/URL textbox, type the following name:
PLABDC01
Click the Hostname/IP Lookup button.
Step 39
Note that the results of the hostname will be now resolved to its IP address in the right pane.
Click the Ping button.
Step 40
The ping response from PLABDC01is received.
Click the ICMP Traceroute button.
Step 41
Note that the results are displayed.
There is a single hop to PLABDC01.
Note: You can try the remaining options if time permits.
Close the SuperScan 4.1 window.
Close the File Explorer windows and keep Internet Explorer open.
Task 2 - Use Hyena for Enumeration
Hyena is one of the most renowned tools for system management used by network administrators. Hyena with its system management capabilities can perform enumeration of various types of information:
users
shares
services
In this task, you will learn to use Hyena for enumeration. To use Hyena, perform the following steps:
Step 1
Ensure you have powered on all the devices listed in the introduction and connect to PLABWIN10. Ensure that Internet Explorer is open, and you are on the Hacking Tools page.
Note: If you closed Internet Explorer in the previous task, please ensure you follow the steps provided in Task 1 to reach the Hacking Tools page.
On the Hacking Tools Webpage, scroll to locate hyena.zip. Click hyena.zip.
Step 2
In the notification bar, click Save.
Step 3
When the file is successfully downloaded, in the notification bar, click Open folder.
Step 4
In the File Explorer window, right-click hyena.zip and select Extract All.
Note: The files in the download folder may differ in your lab environment.
Step 5
In the Extract Compressed (Zipped) Folders dialog box, keep the default path and click Extract.
Step 6
A new File Explorer window is displayed with the Hyena_English_x86 file. Double-click the Hyena_English_x86 file.
Step 7
The Hyena v11.2 - InstallShield Wizard is displayed. It prompts with a pre-requisite application, which is Microsoft Visual C++ 2008 SP1, to be installed before installing Hyena. To begin the installation of Microsoft Visual C++ 2008 SP1, click Install.
Step 8
The installation of the required application starts.
Step 9
After the required application is installed, you are navigated to the Welcome to the InstallShield Wizard for Hyena v11.2 page. Click Next.
Step 10
On the License Agreement page, select I accept the terms of the license agreement and click Next.
Step 11
On the Choose Destination Location page, keep the default installation path and click Next.
Step 12
On the Ready to Install the Program page, click Install.
Step 13
On the InstallShield Wizard Complete page, click Finish.
Step 14
Close all instances of File Explorer windows. Minimize the Internet Explorer window.
In the Type here to search text box, type the following:
hyena
From the search results, select Hyena.
Step 15
The SystemTools Update Notification Utility dialog box is displayed.
Click Close.
Step 16
On the Registration dialog box, click OK.
You can skip the registration process.
Step 17
On the Hyena dialog box, click No.
Step 18
The Hyena v11.2 window is displayed. It is divided into the left and right pane.
In the left pane, the PRACTICELABS.COM domain has already been added automatically.
To remove a domain, click File and then select Manage object View.
Step 19
In the Object Manager Configuration dialog box, select the PRACTICELABS.COM domain under the Object Name column and then click Delete.
Step 20
The PRACTICELABS.COM domain is removed now. Click OK to close the Object Manager Configuration dialog box.
Step 21
You are back on the Hyena v11.2 window. Notice that the PRACTICELABS.COM domain is no longer listed in the left pane. To add a domain, click File and select Add Domain.
Step 22
The Add Domain(s) to View dialog box is displayed. In the Domain Name text box, type the following domain name:
PRACTICELABS.COM
Click OK.
Step 23
The PRACTICELABS.COM domain appears in the left pane. Along with this, the Object manager Configuration opens automatically.
Click OK to close it.
Step 24
In the left pane, expand PRACTICELABS.COM. The Admin Tools Reminder dialog box is displayed. Click OK.
Step 25
You should now notice several nodes that are now visible below PRACTICELABS.COM.
Expand Domain Controllers, expand PLABDC01, and then double-click Services.
Note: You can click on various nodes and view information.
Notice that a list of services running on PLABDC01is displayed. You can also view their current status.
Step 26
Double-click Sessions.
The right pane displays the number of established sessions.
Note: The current number of users may vary from the screenshot below.
At present, there is only one session, which is established by the Administrator.
Step 27
Double-click Disk Space.
The right pane displays the available drives and information on disk space, such as total, free, and used space.
Close the Hyena v11.2 window.
Keep the Internet Explorer window open.
Task 3 - Perform LDAP Enumeration Using Softerra LDAP Administrator
Softerra LDAP Administrator is an LDAP management tool. You can use it to perform various LDAP operations.
In this task, you will perform LDAP enumeration using Softerra LDAP Administrator. To do this, perform the following steps:
Step 1
Ensure you have powered on all the devices listed in the introduction and connect to PLABWIN10.
Ensure that Internet Explorer is open, and you are on the Hacking Tools page.
Note: If you closed Internet Explorer in the previous task, please ensure you follow the steps provided in Task 1 to reach the Hacking Tools page.
On the Hacking Tools Webpage, scroll to locate ldapadmin-4.12.15229.0-x86-eng.msi. Click ldapadmin-4.12.15229.0-x86-eng.msi.
Step 2
In the notification bar, click Save.
Step 3
In the notification bar, click Run.
Step 4
On the Welcome to the Softerra LDAP Administrator 2015.1 Installation Wizard page of the Softerra LDAP Administrator 2015.1 Setup wizard, click Next.
Step 5
On the License Agreement page, select I accept the license agreement and click Next.
Step 6
On the Readme Information page, scroll and read through the information. Click Next.
Step 7
On the Destination Folder page, keep the default installation path and click Next.
Step 8
On the Select Installation Type page, Typical is selected by default. Keep the default selection, click Next.
Step 9
On the Ready to Install the Application page, click Next.
Step 10
On the Updating System page, installation progress is displayed.
Step 11
On the Softerra LDAP Administrator 2015.1 has been successfully installed page, click Finish.
Minimize the Internet Explorer window.
Step 12
Double-click the Softerra LDAP Administrator 2015.1 icon on the desktop.
Step 13
The Softerra LDAP Administrator 2015.1 window is displayed.
Select Remember my preference and click Yes.
Step 14
From the top menu bar, click Server and select New Profile.
Step 15
The Profile Creation Wizard - Step 1 wizard is displayed. On the Server Profile Name page, enter the following in the Profile Name textbox:
PLAB
Click Next.
Step 16
On the Profile Generation Information page, in the Host text box, type the following name:
PLABDC01
Click Lookup Servers.
Step 17
The Lookup LDAP Servers dialog box is displayed. PRACTICELABS.COM will be populated automatically in the Lookup in domain textbox.
The Available servers textbox displays PLABDC01.PRACTICELABS.COM:389. Select it and click Select.
Step 18
You are back on the Profile Creation Wizard. Note that all the information is now populated. Click Next.
Step 19
On the User Authentication Information page, select Currently logged on user (Active Directory only) and click Next.
Step 20
On the LDAP Settings page, keep the default settings and click Finish.
Step 21
The left pane displays several nodes under PLAB. The right pane displays various attributes.
Step 22
In the left pane, expand DC=PRACTICELABS and then expand CN=Users and select it.
Step 23
The quickest method to locate information in LDAP Administrator is by using search.
You can use Quick Search, which is located on the right side above the menu bar, to find the required information.
Click on PLAB at the top of the Scope pane and enter the following in Quick Search:
administrator
Once entered, click the search button adjacent to the search box.
Step 24
The search result is displayed. Now, only the Administrator account is listed in the search result.
Step 25
Right-click the result and select Locate in Tree.
Step 26
Note that the nodes in the left pane are automatically expanded, and CN=Administrator is highlighted.
Step 27
You can also perform several tasks on LDAP, which is Active Directory in this case. For example, you can modify a user.
Note: If you would like to try the other available tasks/options, you can perform at your own pace.
In the left pane, right-click CN=Administrator, select All Tasks, and then select Reset Password.
Step 28
The Reset Password for Administrator dialog box is displayed.
In the New password text box, type the following password:
Passw0rd
In the Confirm password text box, type the following password:
Passw0rd
Click OK.
Step 29
The Reset Password dialog box is displayed. Note that the status is now marked as Completed. Click Close. The password for the Administrator user is now changed.
Note: This tool has many more capabilities than just the ones demonstrated in the lab environment, you can explore these if you have time.
Close the Softerra LDAP Administrator 2015.1 window.
Keep Internet Explorer window open.
Task 4 - Perform SNMP Enumeration Using IP Network Browser
There are various tools available in the market for SNMP enumeration. Two key tools are:
SolarWind’s IP Network Browser
ManageEngine OpUtils
IP Network Browser is a that is used for performing network discovery. It can use either ICMP or SNMP to perform network discovery. In this task, you will use the IP Network Browser. To do this, perform the following steps:
Step 1
Ensure you have powered on all the devices listed in the introduction and connect to PLABWIN10.
Ensure that Internet Explorer is open, and you are on the Hacking Tools page.
Note: If you closed Internet Explorer in the previous task, please ensure you follow the steps provided in Task 1 to reach the Hacking Tools page.
On the Hacking Tools Webpage, scroll to locate Toolset-v11.0.1-Eval.zip. Click Toolset-v11.0.1-Eval.zip.
Step 2
In the notification bar, click Save.
Step 3
When the file download is successfully completed, in the notification bar, click Open folder.
Step 4
In the File Explorer window, right-click Toolset-v11.0.1-Eval.zip and select Extract All.
Step 5
In the Extract Compressed (Zipped) Folders dialog box, keep the default path and click Extract.
Step 6
A file copying dialog box will be displayed. After the file copying process is complete, a new File Explorer window is displayed with various files. Double-click the SolarWinds-DesktopToolset-v11 file.
Step 7
The Solarwinds Toolset v11.0.1 Setup dialog box is displayed. It displays a message that Microsoft .Net Framework 3.5 SP1 is being installed.
Alert: In your lab environment, if .Net Framework is already installed, this step will not appear.
Step 8
After the Microsoft .Net installation is complete, Toolset installation will start.
On the Welcome to the SolarWinds Toolset v11.0.1 Setup Wizard page of the Solarwinds Toolset v11.0.1 Setup, click Next.
Step 9
On the End-User License Agreement page, select I Accept the terms in the License Agreement and click Next.
Step 10
On the Destination Folder page, keep the default path and click Next.
Step 11
On the Ready to install SolarWinds Toolset v11.0.1 page, click Install.
Step 12
The installation will now begin; it should take a few minutes to complete.
Step 13
After the installation has completed, on the Toolset dialog box, click Continue Evaluation.
Step 14
You will finally be asked if you would like to send solar winds anonymous data, select No, I would not like to participate, and then click OK.
Step 15
The installation is now in progress.
When setup is successfully completed, click Finish.
Close all instances of File Explorer.
Minimize the Internet Explorer window.
Step 16
The Toolset Launch pad will now be displayed.
Step 17
Before performing SNMP enumeration, you need to ensure that the target machine is set to accept requests.
In this task, you will configure PLABDC01for accepting the requests.
Connect to PLABDC01. The desktop is displayed.
Step 18
Click the Start charm, click Windows Administrative Tools, and then select Services.
Step 19
The Services snap-in is displayed.
Scroll down and select SNMP Service.
Double-click SNMP Service.
Step 20
The SNMP Service Properties (Local Computer) dialog box is displayed.
Click the Security tab.
Step 21
Here, you will define a community and allow this system to accept SNMP packets from other systems.
Click Add under the Accepted community names section.
Step 22
The SNMP Service Configuration dialog box is displayed.
In the Community Name text box, type the following name:
public
Click Add.
Step 23
Notice that the community public appears in the Accepted Community names section. Select Accept SNMP packets from any host and click OK.
Step 24
Connect to PLABWIN10. The Toolset LaunchPad window is already open. Click SNMP in the left pane.
Step 25
The right pane lists several SNMP related tools.
Click Launch under MIB Viewer.
Step 26
The Toolset dialog box is displayed.
Click Continue Evaluation.
Step 27
The MIB Viewer dialog box is displayed.
Click inside the Hostname or IP Address textbox.
The Device Credentials dialog box is displayed. in the Device or IP address drop-down, enter:
192.168.0.1
From the Community string drop-down, type:
public
Click OK.
Step 28
You will then be prompted to store the Community string, click Yes.
Note that the name is now populated in the Hostname or IP Address textbox.
From the MIB Table to download drop-down, select any of the given MIB Table names.
Click Download MIB Table.
Step 29
The RFC1213-MIB:system on PLABDC01.PRACTICELABS.COM dialog box is displayed. The required information is displayed. Similar to this tool, you can try other listed tools.
Comments
Post a Comment