<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reconnaissance on rchitect</title><link>https://www.rchitect.in/series/reconnaissance/</link><description>Recent content in Reconnaissance on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 20 Jun 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/series/reconnaissance/index.xml" rel="self" type="application/rss+xml"/><item><title>Port 139,445 SMB enumeration</title><link>https://www.rchitect.in/posts/smb-enumeration/</link><pubDate>Mon, 20 Jun 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/smb-enumeration/</guid><description>&lt;h1 id="smb-enumeration"&gt;
 SMB enumeration
 &lt;a class="heading-link" href="#smb-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;SMB is application layer protocol. This protocol is used for communication between PCs in same network. SMB mainly used for file transfer.&lt;/p&gt;
&lt;p&gt;Here we are going to explian the enumeration techniques can be used for SMB protocol. Firat the below scan confirm the nmap ports are open in a server or not.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;sudo nmap -sS -p- -Pn -T4 --min-rate 10000 -oN alltcp.txt 10.10.11.101
[sudo] password for rocky: 
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-06-10 19:46 EDT
Nmap scan report for 10.10.11.101
Host is up (0.048s latency).
Not shown: 65531 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Once we see 139,445 ( smb related ports) are open lets try to enumerate more at smb level.&lt;/p&gt;</description></item><item><title>Nmap timers</title><link>https://www.rchitect.in/posts/nmaptimers/</link><pubDate>Wed, 30 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/nmaptimers/</guid><description>&lt;h1 id="what-are-max-retries-and-min-rate-in-nmap"&gt;
 What are max retries and min-rate in nmap
 &lt;a class="heading-link" href="#what-are-max-retries-and-min-rate-in-nmap"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;h5 id="max-retries"&gt;
 Max-retries
 &lt;a class="heading-link" href="#max-retries"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h5&gt;
&lt;p&gt;Its mainly used for troubleshooting purpose to confirm the ports open.&lt;/p&gt;
&lt;p&gt;Higher the number it will provide accurate results. Lower the number the scan complete fast. If you you put max-retries as 0 it just scan single time and stops.&lt;/p&gt;
&lt;p&gt;Command:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;nmap -Pn --max-retries 0 -p 80 10.10.10.43 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If you are looking for some specific ports, you can try this simple script:&lt;/p&gt;</description></item><item><title>IPSEC enumeration using Strongswan</title><link>https://www.rchitect.in/posts/ipsec-enumeration/</link><pubDate>Tue, 08 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/ipsec-enumeration/</guid><description>&lt;h1 id="vpnike-enumeration"&gt;
 VPN(IKE) enumeration
 &lt;a class="heading-link" href="#vpnike-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;isakmp service( port-500 related to ipsec VPN) only opened on server.There are some inbuilt scanners in Kali linux to enumerate IPSEC VPN&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;$ ike-scan -M 10.10.10.116 
Starting ike-scan 1.9.4 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/)
10.10.10.116 Main Mode Handshake returned
 HDR=(CKY-R=8ec1706b5f6632a8)
 SA=(Enc=3DES Hash=SHA1 Group=2:modp1024 Auth=PSK LifeType=Seconds LifeDuration(4)=0x00007080)
 VID=1e2b516905991c7d7c96fcbfb587e46100000009 (Windows-8)
 VID=4a131c81070358455c5728f20e95452f (RFC 3947 NAT-T)
 VID=90cb80913ebb696e086381b5ec427b1f (draft-ietf-ipsec-nat-t-ike-02\n)
 VID=4048b7d56ebce88525e7de7f00d6c2d3 (IKE Fragmentation)
 VID=fb1de3cdf341b7ea16b7e5be0855f120 (MS-Negotiation Discovery Capable)
 VID=e3a5966a76379fe707228231e5ce8652 (IKE CGA version 1)

Ending ike-scan 1.9.4: 1 hosts scanned in 0.325 seconds (3.08 hosts/sec). 1 returned handshake; 0 returned notify
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The tunnel uses IKE-V1 as per above results.To confirm its not running on IKE-V2&lt;/p&gt;</description></item><item><title>Port 161,162 SNMP enumeration</title><link>https://www.rchitect.in/posts/snmp-enumeration/</link><pubDate>Sun, 27 Feb 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/snmp-enumeration/</guid><description>&lt;h1 id="snmp-enumeration-of-port-udp-ports-161-162"&gt;
 SNMP enumeration of port udp ports 161-162
 &lt;a class="heading-link" href="#snmp-enumeration-of-port-udp-ports-161-162"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;Initial Scan&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;sudo nmap -sU --open -p 161 10.10.10.116 -oG out.txt\$ cat out.txt 
# Nmap 7.91 scan initiated Sun Mar 6 18:06:39 2022 as: nmap -sU --open -p 161 -oG out.txt 10.10.10.116
Host: 10.10.10.116 () Status: Up
Host: 10.10.10.116 () Ports: 161/open|filtered/udp//snmp///
# Nmap done at Sun Mar 6 18:06:40 2022 -- 1 IP address (1 host up) scanned in 1.04 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Some Basic SNMP enumeration commands&lt;/p&gt;</description></item></channel></rss>