Hey, after I connect to a company vpn should I nmap scan? if yes what should I do after nmap scan?
doesnt have to be specific im just asking.
doesnt have to be specific im just asking.
heyhi
after accessing local network through VPN you should start scanning local network with nmap to find something useful that give you DC access
Hey thanks, Im kind of a begginer so sorry for asking a lot of questions, Im not trying to be spoon fed ,Yes, scanning is the way but bear in mind that nmap can be noisy!
Remember to gain persistence too on the VPN
you could test to bruteforce to check vulnerablities in networkhey
can ou give me example for some useful stuff that can give me access to DC?
find somthing like what?you could test to bruteforce to check vulnerablities in network
this will not have problem with AV ,,?1. Connect to the VPN with client
2. 'route print' and get the internal range for scan: 10.10.10.0/24
3. Port scan the network on the range
4. Password spray with common credentials and the VPN credentials you may already have around the network to see if you can remote onto another system in the network (ssh, ftp, telnet, vnc, sql, smb, rdp)
5. Vuln scan the network internally looking for ways to exploit a system to remote onto it
FYI this is not stealthy.
See https://xss.pro/threads/89047 for practice.
Not until you gain access to a system. More likely to trigger an EDR and/or an IDS.fine somthing like what?
this will not have problem with AV ,,?
can you give an example of syntax for Nmap vuln scan? SoftPerfect Nmap integration does not seem to work for me, i receive error for script.1. Connect to the VPN with client
2. 'route print' and get the internal range for scan: 10.10.10.0/24
3. Port scan the network on the range
4. Password spray with common credentials and the VPN credentials you may already have around the network to see if you can remote onto another system in the network (ssh, ftp, telnet, vnc, sql, smb, rdp)
5. Vuln scan the network internally looking for ways to exploit a system to remote onto it
FYI this is not stealthy.
See https://xss.pro/threads/89047 for practice.
do you have off site contact?You can DM me , I can help you to become Domain Admin if you want
for me after getting initial access is pain in my ass, when i try password spraying with vpn credentials and common credentials no luck, tried scanning network for vulnerabilities can't find much, even i tried to backdoor the files i found on shared (no user creds required ones ) network drives no luck,1. Connect to the VPN with client
2. 'route print' and get the internal range for scan: 10.10.10.0/24
3. Port scan the network on the range
4. Password spray with common credentials and the VPN credentials you may already have around the network to see if you can remote onto another system in the network (ssh, ftp, telnet, vnc, sql, smb, rdp)
5. Vuln scan the network internally looking for ways to exploit a system to remote onto it
FYI this is not stealthy.
See https://xss.pro/threads/89047 for practice.
After VPN access to corporate, check if local administrator, if yes, dump LSASS get domain user credentials, see if you can access other workstations. Also check network file shares for credentials stored in legacy files, build these up to password spray internallyHey, after I connect to a company vpn should I nmap scan? if yes what should I do after nmap scan?
doesnt have to be specific im just asking.