The essence of penetration testing is information collection. We can roughly divide the intranet information collection into five steps, namely local information collection, domain information collection, login credential theft, survival host detection, and intranet port scanning. The two most common questions are:
When we gain administrator privileges on a host, we are always eager to learn more. Local information collection 1. Query account information: Understand the user role and user permissions of the current host to determine whether permissions need to be further enhanced.
2. Query network and port information Confirm the connected network status based on the IP address/network connection/related network address of the destination host.
3. Query the process list Check all processes running locally and confirm the status of local software, with a focus on security software.
4. Query system and patch information Get the system version and patch update status of the current host, which can be used to assist in escalating permissions.
5. Credentials Collection Sensitive information is stored on the server side, and various login credentials are collected to expand the results.
Information collection within the domain After collecting the relevant information of the local machine, it is necessary to determine whether the current host is in the domain. If it is in the domain, it is necessary to further collect information in the domain. 1. Determine whether there is a domain Generally, domain servers will also serve as time servers, so use the following command to determine the primary domain
2. Find the domain administrator
3. Find the domain controller Generally speaking, the domain controller server IP address is the DNS server address. By finding the DNS server address, you can locate the domain controller.
|
Data centers are the infrastructure for modern bu...
5G is here! It’s hard to ignore the hype surround...
The tribe once shared information about UCloud, U...
On September 26, the "2022 China Cloud Netwo...
Building owners and facility managers are turning...
Content framework: Big Data Overview Flink Learni...
When it comes to the hottest technology in the wo...
From cross-border e-commerce to new energy vehicl...
Qualcomm's recent "What's Next In 5G...
On August 26, IDC, a leading global IT research a...
IPv6 has features that IPv4 lacks, which makes it...
Smart manufacturing has the potential to improve ...
It has been a long time since I shared informatio...
How will businesses’ approach to networking evolv...
The full implementation of the number portability...