PenetrationTesting Notes
PenetrationTesting Notes
Kali Linux
Offensive Security
Virtual Machine
Advance Package Tool
LINUX IS HUGE
Recognizance
Gathering of information, requires techonological ,social and researching skills
overlook no details
Open-source intelligence: common knowledge on a company or any possible target
Important to stay in the scope of the testing
This is where related vulnerable systems are found
-Active recongnaissance: direct interaction with the target; higher likelihood
of being detected
-Passive recognissance: using the information available on the web; almost
impossible for a single target to track it
Google Hacking
Social Engineering
Scanning
Service
20
21
22
23
25
53
80
137139
443
445
1433
3306
3389
5800
5900
4 Sub-steps:
-Determining if the system is alive:
-Identifying the ports and services running every open port is a potential
door to the system
-Leverage the NSE to further interrogate the ports and other findings.
NSE = TOOL that extends Nmaps power and flexibility makes use of custom or
premade scrypts to discover processes and vulnerabilities
Vulnerabilities may be very different. Some will allow the attacker to take complete
control of a system, while others will just give him a small window to attack or non
at all
FIRST SCAN PERIMETER DEVICES (USUALLY LESS PROTECTED), THEN MAIN TARGET
not easy to get into a network unless you chain machines PIVOTING