Pentest & Bug Bounty Resources and Techniques
  • Pentest & Bug Bounty Resources and Techniques
    • Introduction
    • Tests Checklist
    • OSINT
    • Communications Security
      • SSL/TLS
    • Networking
      • Subdomains Discovery
        • DNS & OSINT
        • DNS Brute force
          • Second DNS Brute-Force Round
      • Subdomain Takeover
      • Network Host Scan/Discovery
        • External/Internal
        • Internal only
      • Network Vulnerability Scanning
      • Network Hacking
      • Parsing
      • Reporting
    • Brute Force
      • Wordlists
      • Databases
      • SSH
    • Web
      • Endpoint Discovery
      • Infrastructure & Configuration
        • Headers
        • WAF Detection/ Evasion
      • Injection
        • GraphQL
        • Cross-Site Scripting (XSS)
        • SQL Injection
        • Payloads
      • SSRF & XXE
        • Labs & Resources
        • Tools
        • SVG SSRF Cheatsheet
        • XXE - XEE - XML External Entity
      • JWT Vulnerabilities (Json Web Tokens)
      • HTTP/S DoS
    • Mobile
      • Both
        • SAST
          • MobSF
        • DAST
          • Installing Frida and Objection
      • Android
        • Create a Lab
          • Rooting Android Emulator
          • Rooting Android Emulator Cheat Sheet
        • APK Certificates
        • SAST
          • APKs
            • Get Information from APK
            • GDA (GJoy Dex Analysizer)
            • Scanning APK for URIs, endpoints & secrets
            • Google Maps API Scanner
        • DAST
          • Rooting the Android Studio AVDs
          • non-Rooted devices
            • Bypass SSL Pinning - non-rooted devices
              • Method 1: apk-mitm
              • Instrumentation with Frida and Objection
                • Bypass SSL Pinning - Method 2: With Objection Explore
                • Bypass SSL Pinning - Method 3: With root_bypass.js
          • Rooted Devices
            • Run frida-server in the emulator or device
            • Inject Frida
            • Bypass SSL Pinning - rooted devices
              • Install Burp CA as a system-level CA on the device
      • iOS
        • SAST
          • Building a reverse iOS engineering environment for free
          • Test Vulnerabilities
  • Lets Practice
    • Virtual Machines
    • Vulnerable App
    • Guided Labs
    • CTFs
  • Group 1
    • AI
Powered by GitBook
On this page
  • ARP Scan
  • NetDiscover
  • SMB security level
  • NetBIOS Scanner
  • Nmap nbstat
  • Metasploit
  • Enumerate SMB resources
  1. Pentest & Bug Bounty Resources and Techniques
  2. Networking
  3. Network Host Scan/Discovery

Internal only

PreviousExternal/InternalNextNetwork Vulnerability Scanning

Last updated 9 months ago

ARP Scan

arp-scan --interface=wlan0 --localnet
arp-scan --interface=wlan0 10.0.1.0/24

More Info:


NetDiscover

netdiscover -i wlan0 -r range

-r range: scan a given range instead of auto scan. 192.168.6.0/24,/16,/8

netdiscover -i wlan0 -p -f -P -L

-P print results in a format suitable for parsing by another program and stop after active scan

-L similar to -P but continue listening after the active scan is completed

-f enable fastmode scan, saves a lot of time, recommended for auto

-p passive mode: do not send anything, only sniff


SMB security level

nmap --script smb-security-mode.nse -p 445 <PORT> <TARGET>
nmap -sU -sS --script smb-security-mode.nse -p U:137,T:139,445
nmap -p445 --script smb-protocols <TARGET>


NetBIOS Scanner

Nmap nbstat

nmap -sU --script nbstat.nse -p137 <host>

Metasploit

  • use auxiliary/scanner/smb/smb_version

  • use auxiliary/scanner/smb/smb_enumshares

  • use auxiliary/scanner/smb/smb_lookupsid

  • use auxiliary/scanner/smb/smb_enumusers


Enumerate SMB resources

nmap -sU -sS --script smb-enum-shares.nse -p U:137,T:139,445

Info:

NetBIOS Scanner:

https://www.blackmoreops.com/2015/12/31/use-arp-scan-to-find-hidden-devices-in-your-network/
https://tools.kali.org/information-gathering/arp-scan
http://nmap.org/nsedoc/scripts/smb-security-mode.html
http://www.nirsoft.net/utils/netbios_scanner.html
https://nmap.org/nsedoc/scripts/nbstat.html
Page cover image