CEH Lab Manual

Enumeration Module 04 Enumeration

E num eration is the process o f extracting usernam es, m achine names, netirork

Enum eration is conducted in an־ . resources, shares, and services fro m a system

intranet environm ent.

ICON KEY Lab Scenario / Valuable Penetration testing is much more than just running exploits against vulnerable information systems like we learned 111 the previous module. 111 fact a penetration test begins .Test your before penetration testers have even made contact with the victim systems ״ y knowledge As an expert ethical hacker and penetration tester you must know how to — Web exercise enumerate target networks and extract lists of , names, user m Workbook review groups, ports, operating systems, machine names, network resources, and services using various enumeration techniques. Lab Objectives

The objective of tins lab is to provide expert knowledge 011 network enumeration and other responsibilities that include: ■ User name and user groups ■ Lists of computers, their operating systems, and ports ■ Machine names, network resources, and services

■ Lists of shares 011 individual hosts 011 the network ■ Policies and passwords

& Tools Lab Environment demonstrated in :out die lab, you need ־this lab are To earn available in ■ Windows Server 2012 as host machine D:\CEH- Tools\CEHv8 ■ Windows Server 2008, Windows 8 and Windows 7 as virtual machine Module 04 ■ A web browser with an Internet connection Enumeration ■ Administrative privileges to mil tools Lab Duration Time: 60 Minutes Overview of Enumeration

Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted 111 an intranet environment.

CEH Lab Manual Page 267 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

TASK 1 Lab Tasks Overview Recommended labs to assist you 111 Enumeration: ■ Enumerating a Target Network Using Nmap Tool ■ Enumerating NetBIOS Using the SuperScan Tool ■ Enumerating NetBIOS Using the NetBIOS Enumerator Tool ■ Enumerating a Network Using the SoftPerfect Network Scanner ■ Enumerating a Network Using SolarWinds Toolset ■ Enumerating the System Using Hyena Lab Analysis Analyze and document the results related to die lab exercise. Give your opinion on your target’s security posture and exposure.

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

C E H Lab M anual Page 268 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Enumerating a Target Network Using Nmap

E num eration is the process o f extracting user names, m achine names, netirork

resources, shares, and services fro m a system .

ICON KEY Lab Scenario

1._ Valuable 111 fact, a penetration test begins before penetration testers have even made contact information with the victim systems. During enumeration, information is systematically collected s Test your and individual systems are identified. The pen testers examine the systems in their knowledge entirety, which allows evaluating security weaknesses. 111 tliis lab, we discus Nmap; it OT Web exercise uses raw IP packets 111 novel ways to determine what hosts are available on die network, what services (application name and version) those hosts are offering, what c a Workbook review operating systems (and OS versions) they are running, what type of packet biters/firewalls are 111 use, it was designed to rapidly scan large networks. By using the open ports, an attacker can easily attack the target machine to overcome this type of attacks network filled with IP filters, firewalls and other obstacles. As an expert ethical hacker and penetration tester to enumerate a target network and extract a list ot computers, user names, user groups, machine names, network resources, and services using various enumeration techniques. Lab Objectives The objective ot tins lab is to help students understand and perform enumeration on target network using various techniques to obtain: ■ User names and user groups ■ Lists of computers, their operating systems, and the ports on them ■ Machine names, network resources, and services ■ Lists of shares on the individual hosts on die network ■ Policies and passwords

C E H Lab M anual Page 269 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Lab Environment & Tools demonstrated in To perform die kb, you need: this lab are ■ A running Windows Server 2008 as a virtual machine available in D:\CEH- ■ A computer running with Windows Server 2012 as a host machine Tools\CEHv8 Module 04 ■ Nmap is located at D:\CEH-Tools\CEHv8 Module 04 Enumeration Enumeration\Additional Enumeration Pen Testing Tools\Nmap ■ Administrative privileges to install and mil tools Lab Duration Time: 10 Minutes Overview of Enumeration Take a snapshot (a type of quick backup) of Enumeration is die process of extracting user names, machine names, network your virtual machine before each lab, because if resources, shares, and services from a system. Enumeration techniques are something goes wrong, you conducted 111 an intranet environment can go back to it. Lab Tasks

The basic idea 111 diis section is to: ■ Perform scans to find hosts with NetBIOS ports open (135,137-139, 445) ■ Do an nbtstat scan to find generic information (computer names, user names, ]MAC addresses) on the hosts ■ Create a Null Session to diese hosts to gain more information

■ Install and Launch Nmap 111 a Windows Server 2012 machine TASK 1 1. Launch the Start menu by hovering the mouse cursor on the lower-left corner of the desktop. Nbstat and Null Sessions

■3 Windows Server 2012

Ke*<$eurK!1aau L»uc«mr׳<׳(winaows btrvw tt / Zenmap file installs Fvaliatior cepj Bum Mtt the following files: FIGURE 1.1: Windows Server 2012—Desktop view * Nmap Core Files

* Nmap Path Click the Nmap-Zenmap GUI app to open the Zenmap window.

■ WinPcap 4.1.1

■ Network Interface Import

■ Zenmap (GUI frontend)

C E H Lab M anual Page 270 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

5 t 3 T t Administrator

Server Windows Google Hyper-V Nmap - Manager PowerShell Chrome Manager Zenmap GUI ־r= m o f t O

Computer Central Hyper-V SQL Server Panel Virtual Installation Machine... Center... *J Q

Command Mozilla Global Prompt Firefox Network Inventory ־מ £ liflgnr 1!

MegaPing HTTPort 3.SNFM

0c*3Of s«S !*

FIGURE 1.2: Windows Server 2012—Apps 3. Start your virtual machine running WMcwsSetver2008

4. Now launch die nmap tool 111 die Windows Server 2012 host machine. 5. Perform nmap -O scan for die Windows Server 2008 virtual machine (10.0.0.6) network. Tins takes a few minutes.

H U Use the —ossscan- Note: IP addresses may vary 111 your lab environment. guess option for best results in nmap. Zenmap Scjn Tools Profile Help

Target: 10.0.0.6 [v ] Profile: [Scan] | C an cel |

־Command: nmap 10.0.0.6 0

Nmap Output Ports / Hosts [ Topology | Host Details | Scans

FIGURE 1.3: Hie Zenmap Main window Nmap performs a scan for die provided target IP address and outputs die results on die Nmap Output tab. m Nmap.org is die Your tirst target is die computer widi a Windows operating system on official source for downloading Nmap source which you can see ports 139 and 445 open. Remember tins usually works code and binaries for onlv against Windows but may partially succeed it other OSes have diese Nmap and Zenmap. ports open. There may be more dian one system diat has NetBIOS open.

CEH Lab Manual Page 271 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Zenmap TASK 2 Scan Tools £rofile Help

10.0.0.6 V Profile V ||Scani Find hosts with Command: nmap -0 10.0.0.6 NetBIOS ports open Services Nmap Output Ports / Hosts | Topology | Host Details | Scans |

OS < Host nmap -0 10.0.0.6 10.0.0.6 ׳- Starting Nmap 6.01 ( http://nm ap.org ) at 2012-09-04 10:55

Nmap scan report for 10.0.0.6 Host is up (0.00011s latency). Not shown: 993 filte re d ports PORT STATE SERVICE 135/tcp open msrpc 139/tcp open netbios-ssn 4 4 5 /tc p open roicrosoft-ds 5 5 4 /tc p open r t s p 2 8 6 9 /tc p open ic s la p 5357/tcp open wsdapi 10243/tcp open unknown MAC Address: - (M icrosoft) W a rn in g : OSScan r e s u lt s may b not find at least 1 open and 1 closed port Device type: general purpose Running: M icrosoft Windows 7|V ista|2008 OS CPE: cpe:/o:m icrosoft:windows_7::professional cpe:/ /:cpe ־::o:m icrosoft:windows_vista / • s» • • c n l rn s־t־c ו/% rrn c n ^ t • u i nHnwc ויזו • Filter Hosts n

FIGURE 1.4: The Zenmap output window 8. Now you see that ports 139 and 445 are open and port 139 is using NetBIOS.

9. Now launch die command prompt 111 Windows Server 2008 virtual machine and perform nbtstat on port 139 ot die target machine. 10. Run die command nbtstat -A 10.0.0.7.

Adm inistrator Command Prompt _x י c

* C:\U sers\Adninistrator>nbtstat -A 10.0.0.? m Nmap has Local Area Connection 2: — traditionally been a Node IpAddress: [10.0.0. 31 Scope Id: [1 command-line tool run NetBIOS Remote Machine Name Table from a UNIX shell or Nane Type Status (more recently) a Windows command prompt. WIN-D39MRSHL9E4<00> UNIQUE Registered WORKGROUP < 0 0 > GROUP R e g i s t e r e d WIN-D39MR5HL9E4<20> UNIQUE Registered

MAC A d d re s s = D . J l. A M J1_-2D

C :\U sers\Adninistrator>

zl

FIGURE 1.5: Command Prompt with die nbtstat command 11. We have not even created a null sessio n (an unaudienticated session) yet, and we can still pull tins info down.

3 task3 12. Now create a null session.

Create a Null Session

C E H Lab M anual Page 272 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

13. 111 the command prompt, type net use \\X.X.X.X\IPC$ /u:”” (where X.X.X.X is die address of die host machine, and diere are no spaces between die double quotes).

c s. Administrator: Command Prompt

C:\'net use \\10.0.0.7\IPC$ ""/u:"" H Local name Renote name W10.0.0.7\IPC$ Resource type I PC Status OK # Opens 0 tt Connections 1 The command completed successfully.

& N et Command C:\> Syntax: N ET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION | SHARE | START | STATISTICS | STOP | FIGURE 1.6: The command prompt with the net use command TIME | USE | USER | VIEW ] 14. Confirm it by issuing a genenc net use command to see connected null sessions from your host. 15. To confirm, type net use, which should list your newly created null session.

FIGURE 1.7: The command prompt ,with the net use command Lab Analysis Analyze and document die results related to die lab exercise. Give your opinion on your target’s security posture and exposure.

C E H Lab M anual Page 273 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Tool/Utility Information Collected/Objectives Achieved Target Machine: 10.0.0.6 List of Open Ports: 135/tcp, 139/tcp, 445/tcp, N m ap 554/tcp, 2869/tcp, 5357/tcp, 10243/tcp NetBIOS Remote machine IP address: 10.0.0.7 Output: Successful connection of Null session

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Questions

1. Evaluate what nbtstat -A shows us for each of the Windows hosts. 2. Determine the other options ot nbtstat and what each option outputs. 3. Analyze the net use command used to establish a null session on the target machine.

Internet Connection Required □ Yes 0 No Platform Supported 0 Classroom 0 !Labs

C E H Lab M anual Page 274 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Lab

Enumerating NetBIOS Using the SuperScan Tool S/tperScan is a TCP po/t scanner, pinger, and resolver. The tool's features include extensive Windows host enumeration capability, TCP S Y N scanning, and UDP scanning.

ICON KEY Lab Scenario [£Z7 Valuable During enumeration, information is systematically collected and individual systems information are identified. The pen testers examine the systems 111 their entirety; tins allows s Test your evaluating security weaknesses. 111 this lab we extract die information of NetBIOS knowledge information, user and group accounts, network shares, misted domains, and — Web exercise services, which are either running or stopped. SuperScan detects open TCP and UDP ports on a target machine and determines which services are nuining on those m Workbook review ports; by using this, an attacker can exploit the open port and hack your machine. As an expert ethical hacker and penetration tester, you need to enumerate target networks and extract lists of computers, user names, user groups, machine names, network resources, and services using various enumeration techniques. Lab Objectives The objective of tins lab is to help students learn and perform NetBIOS enumeration. NetBIOS enumeration is carried out to obtain: ■ List of computers that belong to a domain ■ List of shares on the individual hosts on the network ■ Policies and passwords

C EH Lab M anual Page 275 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Lab Environment & Tools To earn* out die kb, you need: demonstrated in this lab are ■ SuperScan tool is located at D:\CEH-Tools\CEHv8 Module 04 available in Enumeration\NetBIOS Enumeration Tools\SuperScan D:\CEH- Tools\CEHv8 ■ You can also download the latest version of SuperScan from tins link Module 04 http://www.mcatee.com/us/downloads/tree-tools/superscan.aspx Enumeration ■ A computer running Windows Server 2012 as host machine ■ Windows 8 running on a virtual macliine as target machine ■ Administrative privileges to install and run tools ■ A web browser with an Internet connection m You can also download SuperScan from Lab Duration http: / /\v\v\v. foundstone.co Time: 10 Minutes Overview of NetBIOS Enumeration

1. The purpose ot NetBIOS enumeration is to gather information, such as: a. Account lockout threshold b. Local groups and user accounts SuperScan is not supported by Windows c. Global groups and user accounts 95/98/M E. 2. Restnct anonymous bypass routine and also password checking: a. Checks for user accounts with blank passwords b. Checks for user accounts with passwords diat are same as die usernames 111 lower case Lab Tasks

m. TASK 1 1. Double-click the SuperScan4 file. The SuperScan window appears.

Perform Enumeration

C E H Lab M anual Page 276 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

m Windows XP Service Pack 2 has removed raw sockets support, which now limits SuperScan and many other network scanning tools. Some functionality can be restored by running the net stop Shared Access at the Windows command prompt before starting SuperScan.

isJ SuperScan features: 2. Click the Windows Enumeration tab located on the top menu. Superior scanning speed

Support for unlimited IP 3. Enter the Hostname/IP/URL 111 the text box. 111 this lab, we have a ׳ ranges Windows 8 virtual machine IP address. These IP addresses may van111 Improved host detection lab environments. using multiple ICMP mediods 4. Check the types of enumeration you want to perform. TCP SYN scanning Now, click Enumerate. UDP scanning (two mediods) % SuperScan 4.0 > ^ T x

IP address import Scan | Host and Service Discovery | Scan Options | Tools | Windows Emmefabon"| About | supporting ranges and CIDR formats Hostname/IP/URL 10008 | Enumerate j Options... | Clear Enumeration Type Simple HTML report 0 NetBIOS Name Table generation 0 NULL Session 0 MAC Addresses Source port scanning 0 Workstation type 0 Users Fast hostname resolving 0 Groups 0 RPC Endpoint Dump Extensive banner 0 Account Policies grabbing 0 Shares 0 Domains 0 Remote Tme of Day Massive built-in port list 0 Logon Sessions description database 0 Drives 0 Trusted Domains IP and port scan order o 0 Services randomization 0 Registry

A collection of useful tools (ping, , Whois etc.)

Extensive Windows host enumeration capability Ready -J FIGURE 2.2: SuperScan main window with IP address

C E H Lab M anual Page 277 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

6. SuperScan starts enumerating the provided hostname and displays the results 111 the right pane of the window.

' SuperScan 4.0 X ־%

You can use Scan | Host and Service Discovery | Scan Options | Tools W ndows Enumeration | About | SuperScan to perform port scans, retrieve general Hostname/I P/URL 10.0.0.8 Enumerate Options... network information, such Enumeration Type NetBIOS information on 10.0.0.8 as name lookups and 0 NetBIOS Name Table 4 names in table traceroutes, and enumerate W\ NULL Session Windows host information, 0 MAC Addresses AOMIN 00 UNIQUE Workstation service name 0 Workstation type WORKGROUP 00 CROUP Workstation service name such as users, groups, and 0 Users ADMIN 2 0 UNIQUE Server services name WORKGROUP IE GROUP Group name services. 0 Groups

0 RPC Endpoint Dump MAC address 0 '£ 0 Account Policies 0 Shares Attempting a NULL session connection on 10.0.0.8 0 Domains 0 Remote T»ne of Day on 10.0.0.8 0 Logon Sessions 0 Drives un 0 Trusted Domains Workstation/server type on 10.0.0.8 0 Services s. 0 Registiy Users on 10.0.0.8

Groups on 10.0.0.8

RPC endpoints on 10.0.0.8

Entry 0

Ready

FIGURE 2.3: SuperScan main window with results 7. Wait for a while to com plete the enumeration process. 8. Atter the completion of the enumeration process, an Enumeration completion message displays.

י SuperScan 4.0 1 ^ 1 ° r X %

Scan | Host and Service Discovery | Scan Options | Tools Wndows Enumeration [About |

Hostname/I P/URL 10.0.0.8 Enumerate | Options... | Clear

Enumeration Type M 0 NetBIOS Name Table Shares on 10.0.0.8 0 NULL Session Your scan can be 0 MAC Addresses configured in die Host and 0 Workstation type Domains on 10.0.0.8 Service Discovery and Scan 0 Users 0 Groups Options tabs. The Scan Remote time of day on 10.0.0.8 0 RPC Endporrt Dump Options tab lets you 0 Account Pofccies control such tilings as 0 Shares Logon sessions on 10.0.0.8 name resolution and 0 Domasis 0 Remote Time of Day banner grabbing. Drives on 10.0.0.8 0 Logon Sessions 0 Drives on 0 Trusted Domains Trusted Domains on 10.0.0.8 a> 0 Services 0 Registry Remote services on 10.0.0.8

Remote registry items on 10.0.0.8

- Enumeration complete 1 ✓י 1 ✓י

Ready

Erase Results FIGURE 2.4: SuperScan main window with results 9. Now move the scrollbar up to see the results of the enumeration.

C E H Lab M anual Page 278 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

10. To perform a new enumeration on another host name, click the Clear button at the top right of the window. The option erases all the previous results.

י x ־ ם ^ IT SuperScan 4.0 1'

Scan | Host and Service Discovery | Scan Options | Tools Windows Enumeration | About |

Hostname/I P/URL 1 0 0 0 8 | j Oea, |Enumerate

״[ncacn_ip_tcp:10.0.0.8[49154״ :Enumeration Type Binding ״0-000000000000 0 0 0-0 0 0 00-0 0 00-0 00 00 0 0״ :Object Id 0 NetBIOS Name Table Annotation: "X«ctSrv service" £ Q SuperScan has four 0 NULL Session Entry 25 Ia0d010f-lc33-432c-b0f5-8cf4e8053099" ver״ :MAC Addresses Interface 0 different ICMP host 0 Workstation type 1.0 Binding: "ncacn_np:10.0.0.8[\\PIPE\\at*vc]" discovery methods 0 Users ״Object Id: " 00000000- 0000- 0000- 0000- 000000000000 available. This is useful, 0 Groups Annotation: "IdSagSrv ■trvic•" because while a firewall 0 RPC Endpoint Dump Entry 26 cf4a3053099" ver־ b 0 f S 8־c־Ia0d010f-lc33432״ :Account Pofccies Interface 0 may block ICMP echo 0 Shares 1.0 ״[Binding: "ncacn_ip_tcp:10.0.0.8[49154 requests, it may not block 0 Domans ״0-000000000000 0 0 0-0 0 0 00-0 0 00-0 00 00 0 0״ :Object Id other ICMP packets, such 0 Remote T me 0/ Day Annotation: "IdSegSrv service" as timestamp requests. 0 Logon Sessions Entry 27 0 Drives Interface: "880fd55e-43b9-lle0-bla8-cf4edfd72085" ver 1.0 SuperScan gives you die 0 Trusted Domains potential to discover more Binding: "ncacn_np: 10.0.0.8 [WPIPSWatsvc] " ״Services Object Id: " 00000000- 0000- 0000- 0000- 000000000000 0 03 hosts. 0 Registiy Annotation: "KAPI Service endpoint" Entry 28 Interface: "880fd55e-43b9-lle0-bla8-cf4edfd72085” ver 1.0 ״[Binding: "ncacn_ip_tcp:10.0.0.8[49154 ״000000000000 00000000-0000-0000-0000-״ :Object Id "KAPI Service endpoint״ :Annotation Entry 29 Interface: "880fdS5e-43b9-lle0-bla8-cf4edfd72085" ver

Ready

FIGURE 2.5: SuperScan main window with results Lab Analysis Analyze and document die results related to die lab exercise. Give your opinion on your target’s security posture and exposure.

Tool/Utility Information Collected/Objectives Achieved Enumerating Virtual Machine IP address: 10.0.0.8 Performing Enumeration Types: ■ Null Session ■ MAC Address SuperScan Tool ■ Work Station Type ■ Users ■ Groups ■ Domain ■ Account Policies ■ Registry Output: Interface, Binding, Objective ID, and Annotation

C E H Lab M anual Page 279 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Questions 1. Analyze how remote registry enumeration is possible (assuming appropriate access nghts have been given) and is controlled by the provided registry.txt tile. 2. As far as stealth is concerned, tins program, too, leaves a rather large footprint in die logs, even 111 SYN scan mode. Determine how you can avoid tins footprint 111 the logs.

Internet Connection Required □ Yes 0 No Platform Supported 0 !Labs0 Classroom 0 !Labs0

C E H Lab M anual Page 280 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration 3 Enumerating NetBIOS Using the NetBIOS Enumerator Tool Enumeration is the process of probing identified servicesfor known weaknesses.

ICON KEY Lab Scenario

/ Valuable Enumeration is the first attack 011 a target network; enumeration is the process of information gathering the information about a target machine by actively connecting to it. Test your Discover NetBIOS name enumeration with NBTscan. Enumeration means to knowledge identify die user account, system account, and admin account. 111 tins lab, we g Web exercise enumerate a machine’s user name, MAC address, and domain group. You must have sound knowledge of enumeration, a process that requires an active connection m Workbook review to the machine being attacked. A hacker enumerates applications and banners 111 addition to identifying user accounts and shared resources. Lab Objectives The objective of this lab is to help students learn and perform NetBIOS enumeration. Tlie purpose of NetBIOS enumeration is to gather the following information: ■ Account lockout threshold ■ Local groups and user accounts ■ Global groups and user accounts ■ To restrict anonymous bypass routine and also password checking for user accounts with: & Tools demonstrated in • Blank passwords this lab are • Passwords that are same as the username 111 lower case available in D:\CEH- Lab Environment Tools\CEHv8 :out die lab, you need ־Module 04 To earn Enumeration

CEH Lab Manual Page 281 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

■ NETBIOS Enumerator tool is located at D:\CEH-Tools\CEHv8 Module 04 Enumeration\NetBIOS Enumeration Tools\NetBIOS Enumerator ■ You can also download the latest version of NetBIOS Enumerator from the link http://nbtenum.sourceforge.11et/ ■ If you decide to download the latest version, then screenshots shown m the lab might differ

■ Run tins tool 111 Windows Server 2012 ■ Administrative privileges are required to run this tool Lab Duration Time: 10 Minutes Overview of Enumeration Enumeration involves making active connections, so that they can be logged. Typical information attackers look for 111 enumeration includes user account names for future password guessing attacks. NetBIOS Enumerator is an enumeration tool that shows how to use remote network support and to deal with some other interesting web techniques, such as SMB. Lab Tasks

£ TASK 1 1. To launch NetBIOS Enumerator go to D:\CEH-Tools\CEHv8 Module 04 Enumeration\NetBIOS Enumeration Tools\NetBIOS Enumerator, and Performing double-click NetBIOS Enumerater.exe. Enumeration ם 1 X

using NetBIOS NetBIOS Enumerator 1 Enumerator ! fkjIP range to scan Scan | Clear Settings | from: | Your local ip: 10.0.0.7 to:|| W [1...254] Debug window A

m NetBIOS is designed to help troubleshoot NetBIOS name resolution problems. When a network is functioning normally, NetBIOS over T C P/IP (NetBT) resolves NetBIOS names to IP addresses. \לעב

FIGURE 3.1: NetBIOS Enumerator main window

C E H Lab M anual Page 282 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

2. In the IP range to scan section at the top left of the window, enter an IP range in from and to text fields. 3. Click Scan. m Feature: NetBIOS Enumerator T Z L ^ 1 * ' Added port scan IP range to scan ClearScan Settings GUI - ports can be fron :| 10.0.0.1 Your local ip: added, deleted, edited 10.0.0.7 to | 10.0.0.501 Dynamic memory W [1...254] Debug window management

Threaded work (64 ports scanned at once)

m Network function SMB scanning is also implemented and running.

FIGURE 3.2: NetBIOS Enumerator with IP range to scan 4. NetBIOS Enumerator starts scanning for die range of IP addresses provided. 5. After the compledon of scanning, die results are displayed in die left pane m The network of die window. function, NetServerGetlnfo, is also 6. A Debug window section, located 111 the right pane, show’s the scanning of implemented in this tool. die inserted IP range and displays Ready! after completion of the scan.

C E H Lab M anual Page 283 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

a NetBIOS Enumerator f i ) IP range to scan SettingsScan

from:| 10.0.0.1 Your local ip:

]10 .0 .0 .7 to: | 10.0.0.50 P [1...254] Debog window B ? 10.0.0.3 [WIN-ULY858KHQIP] Scanning from: 0 |U NetBIOS Names (3) to: 10.0.0.50 Ready! ^ WIN-ULY858KHQIP - Workstation Service WORKGROUP - Domain Name WIN-ULY858KHQIP - Rle Server Service (Username: (No one logged onי Q=* The protocol SNMP l~ 2 f Domain: WORKGROUP is implemented and running on all versions of Of Round Trip Time (RTT): 3 ms - Time To Live ( m i Windows. S ? 1 0 .0 .0 .6 [ADMIN-PC] 3 H I NetBIOS Names (6) % ADMIN-PC - Workstation Service WORKGROUP - Domain Name ADMIN-PC - Rle Server Service WORKGROUP - Potential Master Browser ^י % WORKGROUP - Master Browser □□_MSBROW SE_□□-Master Browser Username: (No one logged on) I— ET , Domain: r WORKGROUP ■ -1 5—Of Round Trip Time (RTT): 0 m s -T im e To Uve (TT1. B ? 10.0.0.7 [WIN-D39MR5HL9E4] 0 • E 3 NetBIOS Names (3) !Q Username: (No one logged on) [ Of Domain: WORKGROUP .t . - ע ״ ״ >#■ { 5-• O f Round Trip Time (RTT): 0 ms -Tim e To Lrve ( T H ^

FIGURE 3.3: NetBIOS Enumerator results

.rescan, click Clear ־To perform a new scan 01 .7 8. If you are going to perform a new scan, die previous scan results are erased. Lab Analysis Analyze and document die results related to die lab exercise.

Tool/Utility Information Collected/Objectives Achieved IP Address Range: 10.0.0.1 — 10.0.0.50 Result: NetBIOS ■ Machine Name Enum erator ■ NetBIOS Names Tool ■ User Name ■ Domain ■ MAC Address ■ Round Trip Time (RTT)

C E H Lab M anual Page 284 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Internet Connection Required □ Yes 0 No Platform Supported 0 Classroom 0 !Labs

C EH Lab M anual Page 285 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Enumerating a Network Using SoftPerfect Network Scanner SoftPerfect Netirork Scanner is afree multi-threaded IP, NetBIOS, and SN M P scanner nith a modern interface and many advanced feat!ires.

ICON KEY Lab Scenario

[^7 Valuable To be an expert ethical hacker and penetration tester, you must have sound information knowledge of enumeration, which requires an active connection to the machine y Test your being attacked. A hacker enumerates applications and banners 111 addition to knowledge identifying user accounts and shared resources, hi this lab we try to resolve host — Web exercise names and auto-detect vour local and external IP range. m Workbook review Lab Objectives The objective of this lab is to help students learn and perform NetBIOS enumeration. NetBIOS enumeration is carried out to detect: ■ Hardware MAC addresses across routers ■ Hidden shared folders and writable ones & Tools demonstrated in ■ Internal and external IP address this lab are available in Lab Environment D:\CEH- Tools\CEHv8 To carry out the lab, you need: Module 04 ■ SoftPerfect Network Scanner is located at D:\CEH-Tools\CEHv8 Enumeration Module 04 Enumeration\SNMP Enumeration Tools\SoftPerfect Network Scanner

■ You can also download the latest version of SoftPerfect Network Scanner from the link http: / /www.sottpertect.com/products/networkscanner/

C E H Lab M anual Page 286 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

■ If you decide to download the latest version, then screenshots shown 111 the lab might differ

■ Run tliis tool 111 Windows 2012 server ■ Administrative privileges are required to run this tool

m You can also Lab Duration download SoftPerfect Network Scanner from http://www.SoftPerfect. Tune: 5 A !unites com. Overview of Enumeration

Enumeration involves an active connection so diat it can be logged. Typical information diat attackers are looking for nicludes user account names for future password-guessnig attacks. Lab Task E TASK 1 1. To launch SoftPerfect Network Scanner, navigate to D:\CEH-Tools\CEHv8 Enumerate Module 04 Enumeration\SNMP Enumeration Tools\SoftPerfect Network Network Scanner 2. Double-click netscan.exe

■0 SoftPerfect Network Scanner L ^ J File View Actions Options Bookmarks Help y *■ ₪ A «r j * ■ * Q (0 Web-site ט □

Range From f g . 0 . 0 . 0 | to |~ 0 . 0.0.0 I ♦ 3► f£> Start Scanning *

IP Address Host Name MAC Address Response Time

m SoftPerfect allows you to mount shared folders as network drives, browse them using Windows Explorer, and filter the results list.

Ready Threads Devices 0 /0 Scan

FIGURE 4.1: SoftPerfect Network Scanner main window

3. To start scanning your network, enter an IP range 111 die Range From field and click Start Scanning.

C E H Lab M anual Page 287 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

•0 SoftPerfect Network Scanner 1 - 10

File View Actions Options Bookmarks Help

□ L3 H B # Web-site a Start Scanning II ♦ ן Range From I E0 . 0 . 0 . 1 to I 10 • 0 . 50

Response Time

& Tools demonstrated in this lab are available in D:\CEH- Tools\CEHv8 Module 04

Enumeration Ready______Threads______Devices 0 /0

FIGURE 4.2: SoftPerfect setting an IP range to scan 4. The status bar displays the status ot the scamied IP addresses at die bottom of die window.

>*j SoftPerfect Network Scanner

File View Actions Options Bookmarks Help

□ y | X fc* V IP ₪ A g J=l A B « Web-site

To | 10 . 0 0 . 50 ~| ♦ a IB Stop Scanning » j j | 1 ״ ₪. Range From r 0 . 0

F Address Host Name MAC Address Response Tme ? 10.0.0.1 0! 0 ms 2ms -י■B 10.0.0.2 WIN-MSSELCK4... D ...1 ffl 10.0.0.3 WIN-ULY858KH... 0! 1-0... 1ms a ,■« 10.0.0.5 WIN-LXQN3WR... 0! S-6... 4 ms ISA 10.0.0.6 ADMIN-PC 0' 1-0... 0 ms B e ■ 10.0.0.7 WIN-039MR5H... D 5-C... 0 ms Igu 10.0.0.8 ADMIN 0! t-0... 0 ms £ Q SoftPerfect Network 1«u 10.0.0.10 WIND0WS8 Ot . .8-6... 2 ms Scanner can also check for a user-defined port and report if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN.

FIGURE 4.3: SoftPerfect status bar 5. To view die properties of an individual IP address, nght-click diat particular IP address.

C E H Lab M anual Page 288 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

SoftPerfect Network Scanner

File View Actions Options Bookmarks Help

50To 10Range From B3 10Range 50To ♦ £%• j^> Start Scanning *

IP Address MAC Address Response Time e i 10.0.0.1 0 ■ ^ ^-2... 0 m s 11 ». 10.0.0.2 VVIN-MSSELCK4.. D ■ « - l . . . 2 m s j 10.0.0.3 WIN-UL'f■ ש > El eta 10.0.0.5 WIN-LXQ Open Computer e u 10.0.0.6 ADMIN-P Copy ► s eb 1 0 .0 .0 .7 W IN -D 39 Properties 10 0 0.8 ADMIN eu . . Rescan Computer eta 10.0.0.10 WINDOW Wake-On-LAN i Remote Shutdown Remote Suspend / Hibernate

Send Message... Create Batch File...

Devices 8 /8

FIGURE 4.4: SoftPerfect IP address scanned details Lab Analysis Analyze and document die results related to die lab exercise.

Tool/Utility Information Collected/Objectives Achieved IP Address Range: 10.0.0.1 — 10.0.0.50

SoftPerfect Result: Network ■ IP Address Scanner ■ Host Names ■ MAC Address ■ Response Time

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Questions 1. Examine die detection of die IP addresses and MAC addresses across routers.

2. Evaluate die scans for listening ports and some UDP and SNMP services.

CEH Lab Manual Page 289 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

3. How would you launch external third-party applications?

Internet Connection Required □ Yes 0 No Platform Supported 0 Classroom 0 !Labs

C E H Lab M anual Page 290 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Lab

Enumerating a Network Using SolavWinds Toolset The SolarWinds Toolset provides the toolsyon need ns a network engineer or netn ork consultant to get your job done. Toolset includes best-of-breed solutions that work sit/ply and precisely, providing the diagnostic, peiformance, and bandwidth measurements you want, without extraneous, nnnecessay features.

ICON KEY Lab Scenario / Valuable Penetration testing is much more than just running exploits against vulnerable information systems like we learned 111 the previous module. 111 fact a penetration test begins Test your before penetration testers have even made contact with die victim systems. Rather knowledge dian blindly dirowing out exploits and praying diat one of them returns a shell, — Web exercise penetration tester meticulously study the environment for potential weaknesses and their mitigating factors. Bv the time a penetration tester runs an exploit, he or she is m Workbook review nearly certain diat it will be successful. Since failed exploits can in some cases cause a crash or even damage to a victim system, or at die very least make the victim 1111- exploitable 111 the future, penetration testers won't get the best results. 111 tins lab we enumerate target system services, accounts, hub ports, TCP/IP network, and routes. You must have sound knowledge of enumeration, which requires an active connection to the macliine being attacked. A hacker enumerates applications and Tools banners 111 addition to identifying user accounts and shared resources. demonstrated in this lab are available in Lab Objectives D:\CEH- The objective of tins lab is to help students learn and perform NetBIOS Tools\CEHv8 enumeration. NetBIOS enumeration is carried out to detect: Module 04 Enumeration ■ Hardware MAC addresses across routers ■ Hidden shared folders and writable ones ■ Internal and external IP addresses

CEH Lab Manual Page 291 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

Lab Environment To earn’ out the lab, you need: SolarWinds-Toolset-V10 located at D:\CEH-Tools\CEHv8 Module 04 י Enumeration\SNMP Enumeration Tools\SolarWind’s IP Network Browser ■ You can also download the latest version of SolarWinds Toolset Scanner Irom the link http:/ /www.solarwmds.com/ m You can also download SoftPerfect ■ If you decide to download the latest version, then screenshots shown Network Scanner from http://www.solarwinds 111 the lab might differ .com ■ Run this tool 111 Windows Server 2012 Host machine and Windows Server 2008 virtual machine ■ Administrative privileges are required to run this tool ■ Follow the wizard-driven installation instructions Lab Duration Time: 5 Minutes Overview of Enumeration

Enumeration involves an active connection so that it can be logged. Typical information diat attackers are looking for includes user account names lor future password guessing attacks. Lab Task W TASK 1 Control Panel^־־ Configure SNMP services and select Start .1 .Services ^־־ Administrative Tools^־ Enumerate

X ־□ _ Network File Acton ViM Help ►י » ■ ► Sj □ £5 B. 3 *־ 4■ *־ .Sj □ £5 B 3 ► ■ » ►י

Dcscnpton Status Startup type Log On As f t Stiver Supports We, pa- Running Automatic Local Syste... Sh«H Hardware Detect!:n Provide* notifica.. Running Automatic Local Syne... S^Smir Card Manages k c i!! .. Disabled Local Servict £4 Smart Card Removal Policy A!lc«ss th» systr.. Manual Local Syste .. Oescnptior: E SNMP Service Enafcks Simple... Running Automatic Local Syne.. 1 Lrvjfck: Smpk Network 4 SNMP Trap Recedes trap m#_. Manual Local Service Management Protocol (SNMP) ^ Soft ware Protection Enables the dow .. Automatic (D... Network S.. requests to be processed by this cornputer If this service 15 stopped, ^ Spccial Administration Comclr Hdpct A lcm admreit(.. Manual Local Syste... the computer •will be unoble to 4 Spot Verifier Verifies potential.. Manual (Trig... Local Syste.. proem SNMP irquettt. If this servic. &SGI Full-text Filter Daemon launcher -. Service to launch . Running Manual NT Service... k disabled, any services that explicit!) depend on it will fail to start. £* SQL Server (MSSQLSERVER) Provides stcrcge... Running Automatic NT Service... E3 Cut troubleshooting &SQL Server Agent (MSSQLSERVER) Executes jobs. m... Manual NT Scrvice.. S*,SQL Server Analyse Services (MSSQLS— Supplies online a-. Running Automatic NT Service... time in half using the SQL Server Browser Provides SQL Ser.. Disabled Local Service Workspace Studio, which & SQL Server Distributed Replay CSert One or more Dist.. Manual NT Service... £6 SQL Server Distributed Replay Cortrcl - Provides trace re... Manual NT Service... puts the tools you need for S* SQL Server Integration Services 110 Provides manag.. Running Automatic NT Service... common situations at your 5* SQL Server Reporting Services (MSSQL - Manages, execut.. Running Automatic NT Service... Q SQL Server YSS Writer Provides the inte.. Running Automatic Local Syste.. fingertips SfcSSDP Discovery Discover* rehvor. Disabled Local Service Superfetch Maintains end i . Manual Local Syste.. & System Event Nctficaton Scrvicc Monitors system— Running Automatic Local Syste.. -Task Scheduler Enables a user to.. Running Automatic Local Syste , $׳ S i TCP/IP NetBIOS Helper Provides support.. Running Automatic (T». Local Service

\ Extended >v Standard /

FIGURE 5.1: Setting SNMP Services

C E H Lab M anual Page 292 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

2. Double-click SNMP service. 3. Click die Security tab, and click Add... The SNMP Services Configuration window appears. Select READ ONLY from Community rights and Public 111 Community Name, and click Add.

SNMP Service Properties (Local Computer)

General ] Log On [ Recovery [ Agent [ Traps Security Dependencies

@ Send authentication trap

Accepted community names RightsCommunity

Add... RemoveEdit

D Accept SNMP packets from any host IP Monitor and alert in real time SNMP Service Configuration on network Community rights:______[“ “ availability and ! r e a d o n l y ^1 Cancel health with tools Community Name: including Real- |public

־Time Interface Leam more about SNfflP Monitor, SNMP

Real-Time Graph, OK Cancel Apply and Advanced CPU Load FIGURE 5.2: Configuring SNMP Services 4. Select Accept SNMP packets from any host, and click OK.

SNMP Service Properties (Local Computer)

General Log On Recovery Agent raps | | Z-epenaencies

0 Send authentication trap

Accepted community names

® \ccept SNMP packets from any host O Accept SNMP packets from these hosts

Leam more about SNMP

OK Cancel Apply

C E H Lab M anual Page 293 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

FIGURE 5.3: setting SNMP Services

5. Install SolarWinds-Toolset-V10, located 111 D:\CEH-Tools\CEHv8 Module 04 Enumeration\SNMP Enumeration Tools\SolarWind’s IP Network Browser. 6. Launch the Start menu by hovering the mouse cursor on the lower-left corner of the desktop.

FIGURE 5.4: Windows Server 2012—Desktop view 7. Click the Workspace Studio app to open the SolarWinds Workspace & Perform robust Studio window. network diagnostics for Start Administrator ^ troubleshooting and quickly Server Windows Google Hyper-V Workspace resolving complex Manager PowerShel Chrome Manager Studio m י י network issues IL IT o

V SQL Server־with tools such as Computer Control Hyper Panel Virtual Installation Ping Sweep, DNS Machine... Center... זז ? Analyzer, and Trace Route Command Mozilla ProxySwiL.. Prompt Firefox Standard

£ F3 Internet Explorer <© 1ft

Global Nmap - Network Zenmap Inventory GUI II O

FIGURE 5.5: Windows Server 2012—Apps nie main window of SolarWinds Workspace Studio is shown in the־ .6 following figure.

C E H Lab M anual Page 294 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

י * "! ’ם SolarWinds Workspace Studio File Tabs Yiew Devices Interfaces Gadgets External Tocls Help Compare Engineer s Toolset- I Save Selected Tabs aa ׳ Add New De/ice.. Manage SNMP Credentials © Manage Tehec/SSH Credentials Settings... Q Page Setup... •‘^NewTab £5

!5 Switch Port Mapper _ Telnet/SSH 4A Interface Chart t TraceRoute

^ ^ I Gettingr\r* Started •* V x I !*■ ^ ^ S Devices O Getting Started SETTING UP WORKSPACE STUDIO COESTT HAVE TO BE SCARY ״ GrojpDy. Cro_p rtane ד [rSar«G EM Step 1 - Register the ne:wori devices you wcuH iieto montor. Add Device Cevices Q j Recently tseo Step 2 - Drag gadgets from the explorer at feft to this w3rt space and associate them with a device. Id

Step 3 - Add tabs to create grojps cf gadgets 0* crganze then any way you wart. New Tab & L I 0 of C dev <*(s) selected _ Stow QQUO rarres X ¥ ־E>t::re |

Gadgets O More Help ׳ • ' OTHER RC30URCC3 TO GCTYOU : ng 0־d Q Mcn £ Interface Table _ TFTP Service

Running Clear Sefcinas ־l Tdb* Status « ]

1^, Gadgets

Evert Viewer TFTP Service

FIGURE 5.6 Solarwinds workspace studio main window 7. Click External Tools, and then select Classic tools -> Network Discovery -> IP Network Browser.

SolarWinds Workspace Studio T=TO Extcma^ools I Help ״] File Tabs View Devices Interfaces Gadgets g f? Add New Device... Manage SNMP Credentials tj Create New External Tod... ngj.« Q Poge Setup... 1.,^NewTob Save Selected Tabs

B Deploy an array of SS Switch Pert Mapper ^ , Telnet/SSH uul Interface Chart Recently Used network discovery tools oe!tmg Started ' Remote Dcsrtoo ______in׳ including , Cisco Tools O C cttin g sL U E 2 Switch Port Mapper, and SETTING JP /WORKSPACE STUDO DOESN'T HAVE TO IP Address Management Group by: GnupNan* * Advanced Subnet LdunchPad 10311 a | St6p 1 - Register the network devices you wouH l*e te n Network Discovery Devices ] :£ DNS Audit ר ח .Calculator P 1 Recently Jsed Network Monitoring It*) IP Address Management Step 2 - Drag gadgets frcm the explorer at le i tc this wort Ping Diagnostic IP Network Browser | Security Etyr MAC Address Discovery Step 3 - A(M taos :0 create groups or gacgets or orgarize of D dev ee(s) seecte: SMMP Tools Q Network Sonar כ Star cro^raiies t i Ping Ping Sweep da Port Scanner ■jt J Monitoring ^ SNMP Sweep f o f^ l CPU and Wenory @ Subnet List a i Interface Chart " ! Switch Port Moppet & interface Cauge ® nteraceTaWe TFTP Service

[ Step | «*«י *Rjnning Clear SHtma ׳*Statu

gy Gadgets

Event Viewer TFTP Service

FIGURE 5.7: Menu Escalation for IP network browser 8. IP Network Browser will be shown. Enter die Windows 8 Virtual Machine IP address (10.0.0.7) and click Scan Device ( the IP address will be different 111 your network).

C E H Lab M anual Page 295 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

1ST IP Network Browser ף m % * • m 0 ♦ 3 0 ט □t פי P SolarWinds Copy Cop/ Stop Zoom Ping Telnet Trace Config Surf1 Settings^ Help ־Toolset Nevr Re *a rt Export Prin applications use IP Network Browser several methods Scan a Single Device______' 3 ־to collect data 3

about the health Scan a Subnet Subnet Address Scan Suhnel • ן .and performance jd Subnet Mask 1255.255.255.0 of your network, including ICMP, Scan an IP Address Ranqe פר SNMPv3, DNS and Dcgining IP Addicss פר tnding IP Addtess Syslog. Toolset Engineer’s Toolset v10 - Evaluation does NOT require deployment of proprietary agents, appliances, or garden gnomes on the network.

FIGURE 5.8: IP Network Browser windows

9. It will show die result 111 a line widi die IP address and name ot die computer diat is being scanned. 10. Now click the Plus (+) sign before die IP address.

IP Network Browser [ 10.0.0.7 J 1 - O X ״ ז י File Edit Nodes MBs Discovery Subnet View Help e rf f @ 1 «י y m 4 % • * j ® Restart E>port Print Copy Copy Stop Zoom | Ping Telnet Trace Confg Surf Setting: Help ׳NetFlow NeA & Realtime is A A intended for . o granular, real-time nA oV troubleshooting \0■ ,A / 4V׳ > ^ /and analysis of W \ NetFlow statistics | on single A o v < y J *< ■£ן< interface and is limited to a 1 hour A o V /// r J? capture j& Y w < & * / 4 e V -•-׳V V* ־/. (IS* * ?r r J \ י / 3 י י , A U & S Jbre* Scan Ccmoteed

FIGURE 5.9: IP Network Browser windows results page 11. It will list all die information ot die targeted IP address.

C EH Lab M anual Page 296 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

' * ־ם -ן IP Network Browser [ 100.0.7 J File Edit Node* MlBs Discovery Subnet View Help y m % • * 0} s & sf Export Print Copy Copy Stop Zoom Ping Telnet Tra<« Config Surf Setting!

&■ To start a new tab, go ST to ‘tabs’ on the menu bar Jj Ss3ten Naxie: WDI-D39MP5HL9E4 J Description; Harcware: Intel64 Family 6 Hcdel 42 .-eppinc 7 AI/&T CCMPAIIBLI - Softwar! : Windows Version S.2 (B u ild 6 and choose ‘new tab.’ Ti qp 4^ ^ 1 r . 4 .1. 311. r . 1.3.1.2 .6 . 3 .1 :.־״״־-!:Right-click on a tab to aJJ t sysOb;c«rD ׳ מי *bring up options (Import, 0 Last Boot: 9/5/2012 9:13:49 AMIs Export, Rename, Save, Router (w ill fsrvard IF packets ?) : No Close). You can add tools to tabs from die Gadgets bos in die lower left or Adirinittritor vO% C Gueas A direcdy from the gadgets f i UM5*JAaC.ll USSR O' ^ 1 V >ז.menu. A good way to AShared t n a Dilnttn VA o !ל׳ approach it is to collect all TC9/ZF Networks the tools you need for a IPX hetworic given task (troubleshooting — E ^ 0.0.9.0 J? Internet connectivity, for £ <$> :0.0 0 0 255 a example) on one tab. Next S 3> 10.0.0.7 255.255 ti: 10.0.0.26S 255.255 time you face that situation S ^ 127.0.0.0 'S > \ simply open diat tab E ^ 127.0.0.1 K% °^ ♦ <$> 127.266.356.266 a rV*4C*

S jLtisl Sc

FIGURE 5.10: IP Network Browser windows results page Lab Analysis Analyze and document die results related to die lab exercise.

Tool/Utility Information Collected/Objectives Achieved Scan Device IP Address: 10.0.0.7 Output: ■ Interfaces ■ Services SolarWinds Tool ■ Accounts Set ■ Shares ■ Hub Ports ■ TCP/IP Network ■ IPX Network ■ Routes

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Q uestions 1. Analyze the details of die system such as user accounts, system MSI, hub ports, etc.

C E H Lab M anual Page 297 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

2. Find the IP address and Mac address of the system.

Internet Connection Required □ Yes 0 No Platform Supported 0 Classroom 0 !Labs

C E H Lab M anual Page 298 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

Enumerating the System Using Hyena Hyena uses an Explorer-styk interfacefora// operations, including right mouse dick pop-/p context menus for all objects. Management of users, groups (both local and global), shares, domains, computers, services, devices, events, files, printers andprint jobs, sessions, open files, disk space, user rights, messaging, expo/ting job scheduling, processes, andprinting are all suppo/ted. ICON KEY Lab Scenario / Valuable The hacker enumerates applications and banners m addition to identifying user information accounts and shared resources. 111 tliis lab. Hyena uses an Explorer-style interface ' Test your for all operations, management of users, groups (bodi local and global), shares, ____ knowledge______domains, computers, services, devices, events, tiles, printers and print jobs, sessions, m Web exercise open tiles, disk space, user nglits, messaging, exporting, job scheduling, processes, and printing are all supported. To be an expert ethical hacker and penetration tester, £Q Workbook review you must have sound knowledge of enumeration, which requires an active connection to the maclune being attacked. Lab Objectives The objective of this lab is to help suidents learn and perform network enumeration:

■ Users information 111 the system

■ Services running 111 the system & Tools Lab Environment demonstrated in this lab are To perform the lab, you need: available in ■ A computer ranning Windows Server 2012 D:\CEH- Tools\CEHv8 ■ Administrative privileges to install and run tools Module 04 Enumeration ■ You can also download tins tool from following link http: / / www. systemtools.com/livena/download.litm

C E H Lab M anual Page 299 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

■ If you decided to download latest version of tins tool screenshots may differ Lab Duration Time: 10 Minutes Overview of Enumeration

Enumeration is die process of extracting user names, machine names, network resources, shares, and sendees from a system. Enumeration techniques are conducted 111 an intranet environment Lab Tasks

The basic idea 111 diis section is to: 1. Navigate to D:\CEH-Tools\CEHv8 Module 04 Enumeration\NetBIOS E ta s k 1 Enumeration Tools\Hyena Installation of Double-click Hyena_English_x64.exe. You can see die following window. Hyena Click Next

Hyena v9.0 - InstallShield Wizard

ca You can download the Hyena from h t t p : / / u n v 1v.system tools.com

/ hyena/hyena_ne 1v . h t m

FIGURE 6.1: Installation of Hyena 3. The License Agreement window appears, you must accept the agreement to install Hyena. 4. Select I accept the terms of the license agreement to continue and click Next.

C E H Lab M anual Page 300 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

FIGURE 6.2: Select die Agreement 5. Choose die destination location to install Hyena. 6. Click Next to continue the installation.

InstallShield Wizard x ־ Hyena v9.0

Choose Destination Location

Select folder where setup will install files.

In addition to ט Install H yena v 9 .0 to: supporting standard C:\Program Fies\Hyena Change... Windows system management functions, Hyena also includes extensive Active Directory integration

FIGURE 6.3: Selecting folder for installation 7. The Ready to install the Program window appears. Click Install

CEH Lab Manual Page 301 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

—ן r Hyena v9.0 - InstallShield Wizard Ready to Install the Program

The wizard is ready to begin installatic

Click Install to begin the instalation

If you want to review or change any erf your retaliation settings, click Back. Click Cancel to exit the wizard.

ILU Hyena can be used on any Windows client to manage any Windows NT, Windows 2000, Windows XP/Vista, Windows 7, or Windows Server 2003/2008/2012 installation

FIGURE 6.4: selecting installation type 8. The InstallShield Wizard com plete window appears. Click Finish ro complete die installation.

InstallShield Wizard Complete

The InstallShield Wizard has successful instaled Hyena v9.0. Click Finish to exit the wizard.

FIGURE 6.5: Ready to install window Enumerating 9. Launch the Start menu by hovering the mouse cursor on the lower- system left corner of the desktop. Information

CEH Lab Manual Page 302 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

FIGURE 6.6: Windows Seiver 2012—Desktop view & Hyena also . Click the Hyena app to open the Hyena window.10 includes full exporting capabilities and both Microsoft Access and Excel reporting and exporting options

FIGURE 6.7: Windows Server 2012 — Apps 11. The Registration window will appear. Click OK to continue.

12. The main window of Hyena is shown 111 following figiire.

CEH Lab Manual Page 303 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 04 - Enumeration

13. Click + to expand Local workstation, and then click Users.

ף־ x ’י ם '־ J Hyena v9.0 He Edit Wew Tools Help

- J fr W1N-D39MR5HL9E4 (Local Workstation)! a a 11 j 5 £ 1 Drives j g £ " Local Con n ections Hyena v9.0 - cygSU ♦ E Administrator 4 C Guest 4 C Jason (Jason) & C Juggyboy (Juggyboy) B £ Martin (Martin) ♦ C Shiela (Shiela) ♦ J 1 Local Groups >' Printers Shares ^ ♦׳ Sessions ־8 & O pen Files O Services g p Devices Events <נ ffi 4 9 Disk Space j '± £ User Rights I ♦ 9 Performance c a Additional , a Scheduled Jobs command-line options : ± £ Registry j . WMI were added to allow + ^ Enterprise starting Hyena and automatically inserting and selecting/ expanding 6 user(s) found on ,\\W1N-D39MR5HL9E4' a domain, server, or computer. FIGURE 6.9: Expand the System users 14. To check the services running on the system, double-click Services

Services on WWIN-D39MR5HL9E4 ־ Hyena v9.0

Re Ed« Wew Toots Help

- VVIN-D39MR5HL9E4 (Local Workstation) a a ^ Drives & Local C onn ections Services on WWIN-D39MR5HL9E4 I £ Users Name______Display Name______Status______. c Administrator AdobeARM service A dobe A crobat Up... Running ־$5 ♦ C Guest AeLookupSvc Application Experie... Stopped | 5 c Jason (Jason) © ALG Application Layer G... Stopped ♦ C Juggyboy (Juggyboy) © AIIUserlnstallAgent W indow s All-User I... Stopped ^ C Martin (Martin) Running ♦ C Shiela (Shiela) © AppHostSvc Application Host H... ♦ “5 Local Groups © ApplDSvc Application Identity Stopped g ^ Printers © Appinfo Application Inform... Stopped AppM gm t Application Manag... Running ־ ffi Q Shares $ 5 S " Sessions © A udioEndpointB... W indow s Audio En... Stopped iLJ• Qpenhles © Audiosrv Windows Audio Stopped U&fZEELl ® B F E Base Filtering Engine Running 2 P Devices 0 • BITS B ackground Intellig... Running BE dL Events © Brokerlnfrastruct... Background Tasks I... Running O Disk Space © Browser Computer Browser Stopped S S User Rights © CertPropSvc Certificate Propaga... Stopped * 9 Performance © C O M S ysA p p COM♦ System App... Stopped I ♦ 0 Scheduled Jobs Cryptographic Servi... Running Registry Ocrypt^vc ©DcomLaunch DCOM Server Proce... Running i & WMI © defragsvc O ptimize drives Stopped ♦ ^ Enterpnse © DeviceAssociatio... D evice A sso c ia tio n ... Stopped

objects ־ W 1N-D39MR5HL9E41/156\\־ K//www.systemtools.com 156 services found on

FIGURE 6.10: Sendees running in the system 15. To check the User Rights, click + to expand it.

C E H Lab M anual Page 304 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

*r°'־ 'Hyena v9.0 - 3 Drives on A\WIN-D39MR5HL9E4 H e Edt V tcH Tools Hdp

y *3 a X * 3* ::: 5=] Q SI fl J »3 a i fe° E3 « * C Juggyboy (Juggyboy) ♦ C Martin (Martin) ־־WIN-D39MR5HL9E4\\־־ C Shiela (Shiela) 3 Drives on ± ♦ ^ Local Groups Server *■ Drive Format Total Used Pnnters ©W1N-D39MR... C NTFS 97.31 GB 87.15 GB + ^ Shares ©W1N-D39MR... D NTFS 97.66 GB 2.90 GB Sessions ־ S ©WIN-D39MR... E NTFS 270.45 GB 1.70 GB j—^ O pen Files Q b Services Devices ffi & Events ^ Disk Space gh ts I

f t Backup Operators § Users § Adm inistrators (31 § Everyone § £ SeTcbPrivilege (Act as part of th e opera £ & SeM achm eAccountPrivilege (Add work & SeBackupPrivilege (Back up files and dii-,St• iL SeChangeNotifyPrivilege (Bypass traver ^ SeUnsolicitedlnputPrivilege (Sellnsolicii ^ -£־ | SeSystem tim ePrivilege (Change th e sys | -£־ SeCreatePagefilePrivilege (Create a pag- 21 ■= £ SeCreateTo ken Privilege (Create a toki ■=£ :a

7www.systefntools.com 3 Drives on "WW1N-D39MR5HL9E41 ^^^biects

FIGURE 6.11: Users Rights 16. To check the Scheduled jobs, click + to expand it.

J Hyena v9.0 - 77 total scheduled jobs. File Ed« Wew Tools Help » x ♦ 3■ :: |e| o 1$ y y A j .3; j r b צ> y *3 ft C Juggyboy (Juggyboy) a a [Ho m Hyena will execute the ♦ c Martin (Martin) most current Group Policy 9 C Shiela (Shiela) 77 total scheduled jobs. ♦ $ Local Groups editor, GPME.msc, if it is Server *■ Name Status Trigger Type ^ & ^ Printers present on the system 0WIN-D39MR... CCIeanerSkipUAC Ready £ £ 1 Shares 0WIN-D39MR... GoogleUpdateTaskMac... Ready M ultiple Trigc S' Sessions 0WIN-D39MR... GoogleUpdateTaskMac... Ready Daily O pen Files 0WIN-D39MR... GooglellpdateTaskUserS... Ready Daily 9 Services 0WIN-D39MR... GoogleUpdateTaskUserS... Ready Daily 2 P D evices ffi-A Events 5]WIN-D39MR... Optimize Start Menu Ca... Ready On Idle ^ Disk S pace 0WIN-D39MR... .NET Framework NGEN ... Ready ffi-S User Rights 0WIN-D39MR... .NET Framework NGEN ... Ready E B Performance 0WIN-D39MR... AD RMS Rights Policy T... Disabled M ultiple Trigc | — fo ] Scheduled Jobs | 0WIN-D39MR... AD RMS Rights Policy T... Ready At Log on - Microsoft 0WIN-D39MR... PolicyConverter Disabled W indows 0WIN-D39MR... SmartScreenSpecific Ready At Log on ♦; ^ .NET Framework S]WIN-D39MR... VenfiedPublisherCertSto... Disabled At Startup ffi @ Active Directory Rights Manage! 0WIN-D39MR... AitAgent Ready ♦: AppID 0WIN-D39MR... ProgramDataUpdater Ready ♦ I® Application Experience 0WIN-D39MR... StartupAppTask Ready ■ ApplicationData 0WIN-D39MR... CleanupTemporaryState Ready ♦ jL<9 Autochk 0WIN-D39MR... Proxy Ready At Startup ♦ - 3 CertificateServicesClient 0WIN-D39MR... SystemTask Ready M ultiple Trigc EB US Chkdsk 0WIN-D39MR... UserTask Ready M ultiple Trigc ffi ^ Customer Experience Improvem

http://www.systemtools.com 6 registry entries found on WW1N-D39MR5HL 1 /7 7 objects

FIGURE 6.12: Scheduled jobs Lab Analysis Analyze and document the results related to die lab exercise. Give your opinion on .posture and exposure ״your target’s security

C E H Lab M anual Page 305 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module 04 - Enumeration

Tool/Utility Information Collected/Objectives Achieved Intention : Enumerating the system Outpvit: ■ Local Connections ■ Users ■ Local Group ■ Shares Hyena ■ Shares ■ Sessions ■ Services ■ Events ■ User Rights ■ Performance ■ Registry m n י

PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB.

Internet Connection Required □ Yes 0 No Platform Supported 0 Classroom 0 !Labs

C E H Lab M anual Page 306 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.