๐ฅ๏ธ Network Services
Last updated
Last updated
During a typical penetration test, we often encounter networked services designed to:
Manage
Edit
Transfer
Create content
These services are hosted with specific permissions and assigned to individual users.
Here are frequently encountered services during assessments:
๐ File Transfer
FTP, SMB, NFS
โ๏ธ Email & Messaging
SMTP, IMAP/POP3
๐งโ๐ป Remote Access
SSH, RDP, WinRM, VNC, Telnet
๐๏ธ Databases
MySQL, MSSQL
๐ฅ Directory Services
LDAP
๐ For deeper understanding, explore the .
When managing a Windows server over a network, we require services that allow:
Executing commands
Viewing or modifying files
GUI-based or terminal-based control
RDP
Remote Desktop Protocol โ Full GUI access
WinRM
Windows Remote Management โ CLI-based management over HTTP/S
SSH
Secure Shell โ Rare on Windows, common on Linux
โ ๏ธ While SSH is dominant on Linux, its usage on Windows is less frequent but growing.
All these services rely on authentication:
Typically: Username + Password
Can be customized to use:
๐ SSH Keys
๐งพ Certificates
๐ Kerberos tokens
๐ง Many services run with default configurations, making them vulnerable to brute-force or credential stuffing attacks.