Using Pentestingtoolstoscanwebdomains
Using Pentestingtoolstoscanwebdomains
net/publication/360671248
CITATIONS READS
0 80
1 author:
Malintha Maddumage
Sri Lanka Institute of Information Technology
12 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Malintha Maddumage on 18 May 2022.
Assignment 2
Submitted by:
1
Executive Summary
This penetration testing is done to find vulnerabilites and gather information of the organization.
There are many informaiton disclosure vulnerabilites found by pentesting from using different
pentesting tools. And all the vulnerabilites are in critical level.
High Level Medium Level Low level
2
Scenario 01: Web Reconnaissance scan on Winsoft.lk
Tools: Maltego, Recog-ng, theHarvester
Maltego
3
Rcon-ng
4
theHarvester
Searching information in google.
5
• Vulnerability found – Information disclosure
• Vulnerability level - High
• All locations, mail servers, dns servers, employees’ names and porffesions and linkedin
acocunts and ip addresses could be found
• Impact – All the critical information are discolsed to the unathorized parties and they may
use them for attacks (ex: open ports)
6
Scenario 2: IP Address Scanning
Tools: nmap, Angry IP scanner
Nmap
7
8
Angry IP Scanner
9
Scenario 3: Enumertion
Tools: Dns Enumeration, Nslookup, Dig
Dns Enumeration
10
Nslookup:
11
Dig Command
12
Vulnerability found – Brute force and Information diclosure found
Vulnerability level – High
Impact – servenames, ipv4 addresses, host names could be found attacker can use these
information to attack to the system
13
Mitigation Methods
Information diclosure
• Use Strong Autherization methods.
• Use strong encryption methods.
• Double check the codings in Q&A sessions.
• Improve the network security by using good firewalls and training the employees.
• Do port scanning oftenly and close the open ports to.
• Imporve the port security
14
Conclusion
• Large information found about the web domain and the vulnerable machine. Found
information disclosures that contains serve names, locations, host names, ip addresses,
employee personal details. Third parties can use these information to attack to the domain
and the vulnerable machine.
References
All labs and lecture in Applied Information Assurance Module.
15