Protocols and Services

Before moving forward, you should have (at least) performed the following steps:

  1. Information Gathering: to gain as much knowledge as possible about the target, maximizing your chances of success.

  2. Port Scanning: to enumerate open ports, os version and running services versions.

  3. Looking for Known Exploits: by googling, searching in metasploit, exploit-db, and other vulnerability databases.

  4. Attempting to Login: by using the service's default credentials.

Last updated