Hello Everyone!
This is SaintDruG for Black Hat Ethical Hacking .
Todays Hows To Mini Series, involves recon using Nmap Part 2 of 2
Disclaimer:
This Video is for Educational Purpose Only, what you do is
your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone
involved, is not held accounted for if any damage for any reason occurs.
The Black Hat Way, See, Reconnaissance, is time consuming.
Its the only way to attack without it, you cannot do much.
Techniques used by Black Hat, for example the way they use nmap.
to extract and generalise an idea about the target, of course, by
target we mean a client, or your own server, because this tutorial obviously is all about educational purpose only!
Now that this is out of the way, Nmap has scripts, in this example we will show top 7 scripts for light recon, and as you extract, if you find something interesting, that you think could lead to getting a shell just by that info you got, also called vulnerability or an exploit, then you freeze everything and start by exploiting it, to get your shell.
All this Mind Set.. is RED TEAM, However that alone, is totally different than people trained to configure or secure, this is attack mindset, and usually there is defence mindset, hence Blue & Red Teams.
As a bonus, you can get a free Link on How a Complete Target Scan is done, involving over 2.5K lines - consider it as a FREE Course!
Download for Free:
https://github.com/blackhatethicalhacking/howtoscanatargetblackhatstyle
Below Techniques Where Used for this Video:
Target: no-limit-clan.com is owned by blackhatethicalhacking.com // do not do this if you dont have ownership - its for educational purpose only.
DNS Brute Force
dns-brute.nse
Find Hosts on IP
hostmap-bfk.nse
Traceroute Geolocation
traceroute-geolocation.nse
HTTP Recon
http-enum.nse
HTTP Title
http-title.nse
SMB Operating System Discovery
smb-os-discovery.nse
SMB Brute Force
smb-brute.nse
This is one of the methods Black Hat Use, but because we are a Black Hat Ethical Hacking team,
You get to see it from first hand, The Black Hat // Ethical // Way.
Stay Tuned for more to come short How To Videos!
Sound Track:
ROYALTY FREE
Background Music For Videos Fashion Films - Dark Hip-Hop Trap [Royalty Free - Commercial Use]
Dark - Trap
Kevin MacLeod - Spellbound
Mind Trap Original Composition (Cinematic Dark Epic) Royalty Free Music
Download for Free our Conky Theme
https://github.com/blackhatethicalhacking/bheh_conky_theme
This is just one small example of preconfigured known scripts
used in nmap, the scripts check for false positive.
Sometimes when you do not get a result, it means the server
did not respond to it - so its not affected.
But to those that responds, thats where you get recon.
and collect info planning your next move.
Stay Tuned! Enjoy stay safe, and dont forget to get your
free course.
Support our work on Patreon:
https://www.patreon.com/blackhatethicalhacking
Source:
https://www.youtube.com/watch?v=k8J6c0eRHckUploader:
Black Hat Ethical Hacking