The essence of penetration testing is information collection. We can roughly divide the intranet information collection into five steps, namely local information collection, domain information collection, login credential theft, survival host detection, and intranet port scanning. The two most common questions are:
When we gain administrator privileges on a host, we are always eager to learn more. Local information collection 1. Query account information: Understand the user role and user permissions of the current host to determine whether permissions need to be further enhanced.
2. Query network and port information Confirm the connected network status based on the IP address/network connection/related network address of the destination host.
3. Query the process list Check all processes running locally and confirm the status of local software, with a focus on security software.
4. Query system and patch information Get the system version and patch update status of the current host, which can be used to assist in escalating permissions.
5. Credentials Collection Sensitive information is stored on the server side, and various login credentials are collected to expand the results.
Information collection within the domain After collecting the relevant information of the local machine, it is necessary to determine whether the current host is in the domain. If it is in the domain, it is necessary to further collect information in the domain. 1. Determine whether there is a domain Generally, domain servers will also serve as time servers, so use the following command to determine the primary domain
2. Find the domain administrator
3. Find the domain controller Generally speaking, the domain controller server IP address is the DNS server address. By finding the DNS server address, you can locate the domain controller.
|
Preface Regardless of whether you are interviewin...
What changes will Wi-Fi 6 and 5G bring to the con...
The day before yesterday, I published an article ...
At Cheap Windows VPS, we are always innovating ou...
On January 26, China Mobile and China Broadcastin...
This article is reproduced from Leiphone.com. If ...
With the booming development and implementation o...
Ah…the beauty of wireless convenience. Thanks to ...
LightReading reports that the COVID-19 pandemic h...
Network connection and communication are the know...
[[178219]] With the widespread application of IoT...
On September 5, 2017, during HUAWEI CONNECT 2017,...
RAKsmart is a foreign hosting company operated by...
Black Friday is still a long way off, but some bu...
Whether it is the turbulent forty years in Wu Xia...