First of all, we need to enumerate and scan the opened ports. Follow the steps bellow:
- Make new dirs for a full and detailed port scan output files. It's a good pratice organize the files the most as possible.
- Now, we run a non deep nmap scan command (first 1000 ports), just to list the opened ports.
- Move the output files to "nmap_full" dir.
- With the last nmap output results, we need rescans the specifics ports with a deep scan, to enumerate services.
- Move the output files to "nmap_ports" dir.
TIP: If the listed open ports wasn't returned any information about exploit/vulnerability/payload, try to run a deep scan with nmap using de -p- option, maybe there are high ports opened that wasn't listed before: #nmap -sV -p- -v 10.10.11.152 -oA nmap
Check the commands used for the initial enumeration:
(root💀kali): ~/htb/timelapse/
# mkdir nmap_full ; mkdir nmap_ports/
(root💀kali): ~/htb/timelapse/
# nmap -Pn -n -v 10.10.11.152 -oA nmap/
(root💀kali): ~/htb/timelapse/
# mv nmap.* ./nmap_full/
(root💀kali): ~/htb/timelapse/
# nmap -sV -p53,88,135,139,389,445,464,593,636,3268,3269 -v 10.10.11.152 -oA nmap
(root💀kali): ~/htb/timelapse/
# mv nmap.* ./nmap_ports/
(root💀kali): ~/htb/timelapse/
# cat ./nmap_ports/nmap.nmap
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl