⚔️Service Enumeration & Exploitation

🎯 Overview

Service enumeration and exploitation focuses on systematically testing discovered services for vulnerabilities, misconfigurations, and attack vectors. This phase moves from reconnaissance to active testing of FTP, SSH, SMTP, DNS, HTTP, and email services.

📊 Discovered Services Analysis

🔍 Service Inventory

# Primary services identified:
Port 21:  FTP (vsftpd 3.0.3)
Port 22:  SSH (OpenSSH 8.2p1)
Port 25:  SMTP (Postfix smtpd)
Port 53:  DNS (custom banner)
Port 80:  HTTP (Apache 2.4.41)
Port 110/143/993/995: Email (Dovecot)
Port 111: rpcbind
Port 8080: HTTP (Apache 2.4.41)

# Attack priority:
1. Anonymous/weak authentication services
2. Web applications (multiple HTTP ports)
3. Email services for user enumeration
4. Misconfigured network services

📁 FTP Service Testing

🔓 Anonymous Access Validation

🔧 FTP Security Assessment

📋 FTP Attack Vectors

🔑 SSH Service Assessment

📊 Version Analysis

🔧 Authentication Testing

📧 Email Services Enumeration

📋 SMTP Configuration Analysis

👤 User Enumeration via SMTP

🔧 Advanced SMTP Testing

📮 POP3/IMAP Testing

🔍 Authentication Analysis

🔒 Secure Email Port Testing

🌐 RPC Service Assessment

📊 rpcbind Enumeration

🎯 HTB Academy Lab Solution

Lab Environment

📁 Question: Enumerate Services and Find Flag

🔄 Service Testing Methodology

📋 Systematic Approach

🎯 Finding Categories

⚠️ Testing Limitations

🔒 Ethical Boundaries

📋 Documentation Requirements

💡 Key Takeaways

  1. Anonymous FTP access often provides immediate foothold opportunities

  2. User enumeration via SMTP VRFY creates attack vectors

  3. Service versioning enables targeted vulnerability research

  4. Email services require SSL/TLS for secure authentication

  5. RPC services should not be externally exposed

  6. Systematic testing ensures comprehensive service coverage

  7. Professional documentation supports finding validation and remediation


Service enumeration and exploitation systematically tests each discovered service for security weaknesses while maintaining ethical boundaries and comprehensive documentation standards.

Last updated