Target-Enumeration
Target-Enumeration copied to clipboard
nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount
Make sure you have the following applications installed & configured:
- Nmap
- Searchsploit
- GoBuster
- Eyewitness
- Ldapsearch
- Smbclient
- Showmount
This project serves two purposes:
- Automate the typical steps taken when enumerating a target.
- Learn more about scripting and having fun.
Usage:
- Navigate to the directory that holds script
- Add execution to script = chmod +x sma.sh
- Run script = ./sma.sh
- Target Name? = name you'd like to refer to host as
- Target IP? = IP address of host
- Where should we place the target directory? = Path where directory to hold results should be created
- Grab some coffee or a coke
- Review results
- Go get 'em!
Flow of script:
- Adds target to /etc/hosts for you.
- In-depth nmap scan.
- Searchsploit services names & versions, output saved as searchsploit.txt
- GoBuster if webport is open to find subdirectories using default common.txt wordlist, output saved as gobuster.txt
- Eyewitness to take screenshots of all pages GoBuster, output saved as Eyewitness/reports.html
- Smbclient checks if anonymous shares are open >> smbclient.txt
- Query LDAP for recon >> nmap-ldap.txt
- LDAPsearch to pull hashes and user info >> ldap-findings.txt
- List nfs mount points >> nfsmount.txt