In this post, we will be continuing with Part-2 of NetBIOS and SMB enumeration. I highly suggest you read Part-1 before continuing with this post, as we will be continuing right where we left off. In Part-2 of this post, we are going to continue from the scenario at the end of Part-1 where we […] The post AD Recon – NetBIOS (137/138/139) and SMB (445) Part-2 first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this two-part post on AD Recon, we will review various tools that can be used to enumerate the NetBIOS (UDP port 137/138 | TCP port 139) and SMB (TCP port 445) services. To begin, we will learn about the NetBIOS and SMB services, how they tie together, as well as how they are useful for domain […] The post AD Recon – NetBIOS (137/138/139) and SMB (445) Part-1 first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this post, we will look at a few different tools that we can use to enumerate the MSRPC service running on TCP/UDP port 135. We will start with a brief introduction on MSRPC as well as a high level overview of how it works. From there, we will perform an nmap scan on a […] The post AD Recon – MSRPC (135/539) first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
In this Walkthrough, we will be hacking the machine Cascade from HackTheBox. To begin, we will quickly find that we are able to dump information from LDAP using an anonymous session. During our LDAP enumeration, we will create a list of all the users on the system, determine which users are “high targets” based on […] The post HackTheBox – Cascade first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog