Enumeration
Room Link: https://tryhackme.com/room/enumerationpe
Linux Enumeration
What is the Linux distribution used in the VM?
Victim
cat /etc/*-release
What is its version number?
Victim
cat /etc/*-release
What is the name of the user who last logged in to the system?
Victim
last
What is the highest listening TCP port number?
Victim
sudo netstat -atpn
What is the program name of the service listening on it?
Victim
sudo netstat -atpn
There is a script running in the background. Its name starts with THM. What is the name of the script?
Victim
ps axf
Windows Enumeration
What is the full OS Name?
Victim
systeminfo
What is the OS Version?
Victim
systeminfo
How many hotfixes are installed on this MS Windows Server?
Victim
systeminfo
What is the lowest TCP port number listening on the system?
Victim
netstat -n
What is the name of the program listening on that port?
Victim
netstat -nob
DNS, SMB, and SNMP
Knowing that the domain name on the MS Windows Server of IP 10.10.100.178 is redteam.thm, use dig to carry out a domain transfer. What is the flag that you get in the records?
Kali
dig -t AXFR redteam.thm @10.10.100.178
What is the name of the share available over SMB protocol and starts with THM?
Victim
net share
Knowing that the community string used by the SNMP service is public, use snmpcheck to collect information about the MS Windows Server of IP 10.10.100.178. What is the location specified?
Kali
git clone https://gitlab.com/kalilinux/packages/snmpcheck.git
cd snmpcheck/
gem install snmp
chmod +x snmpcheck-1.9.rb
./snmpcheck-1.9.rb 10.10.100.178 -c public
Last updated