Run Nmap scripts to enumerate the Windows target machine IIS service.
host domain_name #get ip address and mail server
host domain_name
host -t ns domain_name #get name servers
host -t ns domain_name
host -l domain_name ns_of_the_domain_name #transfer zone if mal-configured
host -l domain_name ns_of_the_domain_name
es:
➜ ~ host -t ns zonetransfer.me zonetransfer.me name server nsztm1.digi.ninja. zonetransfer.me name server nsztm2.digi.ninja. ➜ ~ host -l zonetransfer.me nsztm1.digi.ninja. Using domain server: Name: nsztm1.digi.ninja. Address: 81.4.108.41#53 Aliases: zonetransfer.me has address 5.196.105.14 zonetransfer.me name server nsztm1.digi.ninja. zonetransfer.me name server nsztm2.digi.ninja. 14.105.196.5.IN-ADDR.ARPA.zonetransfer.me domain name pointer www.zonetransfer.me. asfdbbox.zonetransfer.me has address 127.0.0.1 canberra-office.zonetransfer.me has address 202.14.81.230 dc-office.zonetransfer.me has address 143.228.181.132 deadbeef.zonetransfer.me has IPv6 address dead:beaf:: email.zonetransfer.me has address 74.125.206.26 home.zonetransfer.me has address 127.0.0.1 internal.zonetransfer.me name server intns1.zonetransfer.me. internal.zonetransfer.me name server intns2.zonetransfer.me. intns1.zonetransfer.me has address 81.4.108.41 intns2.zonetransfer.me has address 167.88.42.94 office.zonetransfer.me has address 4.23.39.254 ipv6actnow.org.zonetransfer.me has IPv6 address 2001:67c:2e8:11::c100:1332 owa.zonetransfer.me has address 207.46.197.32 alltcpportsopen.firewall.test.zonetransfer.me has address 127.0.0.1 vpn.zonetransfer.me has address 174.36.59.154 www.zonetransfer.me has address 5.196.105.14
dig domain_name #get ip address and mail server dig domain_name -t ns +short #get name servers dig domain_name -t mx #get mail servers dig axfr domain_name @name_server #transfer zone if mal-co...
Use the command below to connect to your MSSQL server: mssql-cli -S <server URL> -d <database name> -U <username> -P <password>; Use the MSSQL-CLI to connect to the remote...
Run Nmap scripts to enumerate the Windows target machine IIS service. nmap -p80 -sV --script http-enum 10.10.10.50 #get IIS info and potentially interesting folders; nmap -p80 -sV --script http-h...
dig command & paste
powershell network scanner command & paste