reconnaissance

Clam AV

Clam AV

Target:

[LAB_IP]

Prep

Open Resources

General Mind Map: https://xmind.app/m/QsNUEz/

Confirm docker is installed and set rustscan as an alias or add to bashrc / fish config due to it being able to scan all ports and services in 10 seconds

alias rustscan='sudo docker run -it --rm --name rustscan rustscan/rustscan:2.1.1 -a'

Create directory for target and enter it

mkdir ClamAV
cd ClamAV

Prep a nc listener

nc -nlvp 4444

Confirm ip address

hostname -I

Recon

Start with a quick open port scan

rustscan [LAB_IP]
PORT      STATE SERVICE      REASON
22/tcp    open  ssh          syn-ack
25/tcp    open  smtp         syn-ack
80/tcp    open  http         syn-ack
139/tcp   open  netbios-ssn  syn-ack
199/tcp   open  smux         syn-ack
445/tcp   open  microsoft-ds syn-ack
60000/tcp open  unknown      syn-ack

Quick OS check

sudo nmap -O --top-ports 1000 -v -T4 [LAB_IP] -oN osType.nmap
No exact OS matches for host

Follow up with a service scan on those open ports

sudo nmap -sC -sV -p22,25,80,139,199,445,60000 -v -T5 [LAB_IP] -oN services.nmap