EJPT Notes :

Pen-testing Cycle:

Information Gathering :

General List

- WHOIS
- DNS Information
- Check live hosts by their IP
- Check if one or more webites using the same IP
- Services runnign on the network 
- Open ports
- OS running on hosts or servers

- Checking Items:
        - Emails
        - Phone numbers
        - websites
        - Addresses
        - Social Media : LinkedIn, Facebook, Twitter, CrunchBase,

Whoeis:
    - use the command whois in Linux and OSX to find the general information                about a domain
        Ex: whois www.apple.com

    - For Windows, Sysinternal Whois

Web Applicaiton:

- Domain
- Sub Domain
- Page (website crawling)
- Technologies 
- Langauges 
- Frameworks and Content Managewment Systems 
- Web Application Testing

Fingerprinting & Scanning

OS Fingerprinting:

    - Fingerprinting OS helps narrow down the range of vulnerabilities and  
        exploitation 
    - Finding an approximate version of the OS
    - Level of patching

Port Scanning:

    - Open ports
    - Type of services on the ports
    - Knowing the running service can infer:
        - OS 
        - IP address inference (server IP or Client IP )
        - Types of servers --
> Databases, Web, Email

General Items

    - Routers
    - Firewalls
    - Hosts
    - Services 
    - Printers
    - Ports

You can perform the fingerprinting passively (through analyzing wireshark stored pcap file) or Actively unsing POF

Port status:

  • if packets are flaged with RST means that the port isclosed

  • if packets compeleted the handshake, then sent RST flag means the port isopen

  • Every TCP connection (full handshake)is logged into the system and can be detectable

  • TCP synis a stealthy way to scan the ports. Sending Syn packets to the target and analyze the results

    The TCP-SYN sends a SYN packet to the target, if it gets RST, it means that the port is closed.

    if the packets are returned with ACK flags mean that the port is open. Therefore, in this case the scanner send RST packet to force close the connection and not compelete the connection.

  • Since there was NO complete handshake, no logs were recorded on the system.

Daemon:

is a service running on a server with specific port. Port scanning helps discover daemon service on the network.

When running port scanning, if the daemon is not running or running on different ports, TCP packets are sent with RST flag

Figuring out the scope of address:

  • 16 bit long netmask means 65536 hosts

  • To detemine which IP addresses are assigned to hosts, useping sweep

  • Ping Sweep Tool: - Fping is a Linux tool

          Ex: fping -a -g IPRANGE 
    
          - a for returning live hosts
          - g for peforeming ping sweeps instead of regular pings
          EX:
              fping -a -g 10.54.12/24
      - Fping also return offline hosts despite the option -a on LAN, to weed out offline hosts 
         while performing the ping sweep use /dev/null
    
      EX: fping -a -g 192.136.82.0 192.168.82.66 2
    
    > /dev/null
    

Tools:

  • P0f:
  • Nmap
  • Zmap [Nmap GUI]

Vulnerability Assessment :

- Can be manually or automatically using automted tools 
- Tools can include Scanners, Fuzzers

Exploitation :

 is the last stage after gathering information and enumerating the systems            multiple times

results matching ""

    No results matching ""