Discovering and launching our attacks
We have the corporate lab established and configured, and we have installed new tools into our Kali distribution. The next item on the agenda is to start taking a look at the network that we have been dropped into. In Chapter 7, Scanning 101, we covered a number of different tools. We can use them here to perform discovery attacks. However, I feel that it would be more appropriate to look at other methods to grow our pentesting arsenal.
Let's start by skipping over rustscan
and nmap
and jump right into enumerating host machines by their NetBIOS names. Run the nbtscan
command on your current subnet by using the following command:
nbtscan 172.16.0.0/24
We should now see our two machines, DC01
and WS01
, as shown in the following screenshot:
Quickly identifying NetBIOS names allows us to take an educated guess that DC01
is the domain controller. With this information in mind, we...