Week 5 - Target Enumeration and Uncovering Real IPs
As always, any tools, techniques, and concepts shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools discussed here. All practical exercises were conducted on authorized target domains.
Week 5 of Ethical Hacking and Penetration Testing moved us from discovering targets into actively enumerating them. Led by S. Pradono Suryodiningrat, the lecture focused on extracting highly specific information from our targets—things like network shares, active usernames, passwords, and the exact operating systems running on the machines.
Here are my notes from the session, followed by the results of our practical lab assignment.
The Theory: Enumerating Environments
Enumeration is an intrusive process. We looked heavily into enumerating Microsoft operating systems, specifically utilizing NetBIOS over TCP/IP (NBT). We practiced installing and using nbtscan on our Kali Linux setups to scan ranges of IP addresses.
We also reviewed more advanced vulnerability scanners and enumeration tools, specifically:
DumpSec and Hyena: For Microsoft OS enumeration.
Nessus: A heavy-duty client used to identify NetBIOS names, shared resources, OS versions, and specific firewall vulnerabilities.
Service Enumeration Tools:
Amap,Httprint,Httsquash, andIke-scan.
Practical Assignment: Unmasking pentest.id
For our assignment, we were given a live target network space: pentest.id.
The goal was to enumerate the users for wp1.pentest.id and jo1.pentest.id, find their real IP addresses, and enumerate an email address associated with the domain.
Here is how I broke it down and what I found:
Finding the Real IPs: I started my reconnaissance using
theHarvester(with thecrtshsource) and ran adig MX pentest.idquery to pull the DNS records. During the testing process, I discovered that both thewp1andjo1subdomains were actually sharing the same IP addresses.Digging deeper to find legitimate, distinct infrastructure on the domain, I successfully identified two different IP addresses:
120.89.92.81(smtp.pentest.id) - Geolocation data placed this IP in Jakarta, Indonesia, under the ISP PT Royal Audrey Megah.209.141.59.59(mdw2.pentest.id) - This IP was traced to Las Vegas, Nevada, operating under FranTech Solutions (PONYNET).
Email Enumeration: To find an email address tied to the domain, I utilized
h8mailcombined with myHunter.ioAPI key. By running a domain search through the API, I successfully extracted the email addresskalpin@pentest.id. I cross-referenced this online via the Hunter dashboard to verify the finding.
It is incredibly satisfying to see the footprinting and discovery techniques from previous weeks finally piece together into actionable intelligence.
Comments
Post a Comment