πInternal Information Gathering
π― Overview
Internal Information Gathering transforms external foothold into comprehensive internal reconnaissance. Establish SSH/Metasploit pivoting, discover live hosts, enumerate Active Directory infrastructure, and exploit misconfigured services for credential harvesting and lateral movement preparation.
π Pivoting Setup Methods
π SSH Dynamic Port Forwarding
# Establish SSH SOCKS proxy
ssh -D 8081 -i dmz01_key root@TARGET_IP
# Verify tunnel establishment
netstat -antp | grep 8081
# Output: tcp 0 0 127.0.0.1:8081 0.0.0.0:* LISTEN 122808/ssh
# ProxyChains configuration
echo "socks4 127.0.0.1 8081" >> /etc/proxychains.conf
# Test connectivity
proxychains nmap -sT -p 21,22,80,8080 172.16.8.120π― Metasploit Autoroute Alternative
π Internal Host Discovery
π Network Scanning Approaches
π― Discovered Infrastructure
π Service Enumeration Results
π 172.16.8.3 - Domain Controller Analysis
π₯οΈ 172.16.8.50 - Tomcat Server Analysis
π 172.16.8.20 - Windows Server + NFS
π NFS Share Exploitation
π NFS Misconfiguration Assessment
π Credential Discovery in Config Files
π DotNetNuke (DNN) Analysis
π Application Assessment
π Firefox SOCKS Proxy Configuration
π‘ Network Traffic Analysis
π Packet Capture Setup
π Network Intelligence Gathering
π― Attack Surface Assessment
π΄ High-Priority Targets
π‘ Secondary Targets
π οΈ Tools & Techniques Summary
π Pivoting Methods
π Discovery Techniques
π― HTB Academy Lab
π Lab Solution Summary
π Learning Objectives
π‘οΈ Defensive Recommendations
π Network Security
Last updated