Enumeration
Amass
amass enum -d [domain] > amass.txtAssetfinder
assetfinder [domain] | grep [domain] > subdomains.txtDNS
dnsenum --dnsserver [target ip] --enum -p 0 -s 0 -o subdomains.txt -f /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt [TLD domain]dnsrecon -r [range] -n [dns host ip] -d [domain]range should be the network, so something like 127.0.0.0/24 when on the same network
-dis not really useful here but it a needed flag - can flll with garbage
HTTProbe
cat hosts.txt | httprobeThis will check port 80 and 443, if we want to narrow this down to only ssl, we can add the following parameters to httprobe:
cat hosts.txt | httprobe -s -p https:443Nmap
network scan
using list of hosts
-iL [host list]
-sTis the most stealthy scan, as it uses the entire TCP handshake to check ports-sAto bypass many IPS and IDS-Pndisable ping-sUUDP scan-p-scan all ports (not just top 1000)-ndisable DNS resolution--disable-arp-pingdisable ARP ping, good for investigating further--packet-traceget more info on send and recv--reasonget more info on the port state-Ddecoy - nmap inserts random IPs in the IP header of the scans--source-portspecify a source port, often 53 to slide through dns portcan also specify this in netcat when connecting to a port
NFS
list mounts:
showmount -e [ip]
mount share:
mount -t nfs -o nolock [ip]:[share] /mnt
SMB
SMB shares can be enumerated many ways
can add directory recursion with
-r --depth [num]can pass the hash with -p (password or hash)
SMTP
SNMP
SSL Certs
crt.sh to get cert information (goes down often)
Pipe this string of commands to grep, cut and awk the unique domain names
Example: find all dev subdomains on facebook.com:
Last updated