πŸ”Internal Information Gathering

🎯 Overview

Internal Information Gathering transforms external foothold into comprehensive internal reconnaissance. Establish SSH/Metasploit pivoting, discover live hosts, enumerate Active Directory infrastructure, and exploit misconfigured services for credential harvesting and lateral movement preparation.

πŸ”„ Pivoting Setup Methods

πŸ”‘ SSH Dynamic Port Forwarding

# Establish SSH SOCKS proxy
ssh -D 8081 -i dmz01_key root@TARGET_IP

# Verify tunnel establishment
netstat -antp | grep 8081
# Output: tcp 0 0 127.0.0.1:8081 0.0.0.0:* LISTEN 122808/ssh

# ProxyChains configuration
echo "socks4 127.0.0.1 8081" >> /etc/proxychains.conf

# Test connectivity
proxychains nmap -sT -p 21,22,80,8080 172.16.8.120

🎯 Metasploit Autoroute Alternative

πŸ” Internal Host Discovery

πŸ“Š Network Scanning Approaches

🎯 Discovered Infrastructure

πŸ” Service Enumeration Results

πŸ“Š 172.16.8.3 - Domain Controller Analysis

πŸ–₯️ 172.16.8.50 - Tomcat Server Analysis

🌐 172.16.8.20 - Windows Server + NFS

πŸ“ NFS Share Exploitation

πŸ” NFS Misconfiguration Assessment

πŸ” Credential Discovery in Config Files

🌐 DotNetNuke (DNN) Analysis

πŸ“Š Application Assessment

πŸ” Firefox SOCKS Proxy Configuration

πŸ“‘ Network Traffic Analysis

πŸ” Packet Capture Setup

πŸ“Š Network Intelligence Gathering

🎯 Attack Surface Assessment

πŸ”΄ High-Priority Targets

🟑 Secondary Targets

πŸ› οΈ Tools & Techniques Summary

πŸ”„ Pivoting Methods

πŸ” Discovery Techniques

🎯 HTB Academy Lab

πŸ“‹ Lab Solution Summary

πŸ” Learning Objectives

πŸ›‘οΈ Defensive Recommendations

πŸ”’ Network Security

Last updated