Skip to content

Latest commit

 

History

History
133 lines (78 loc) · 2.27 KB

PenetrationTesting.md

File metadata and controls

133 lines (78 loc) · 2.27 KB

Penetration Testing

Three ways to attack - Social, Physical, Network

  • Social
    • Ask the person for access, phishing.
    • Cognitive biases - look at how these are exploited.
    • Spear phishing.
    • Water holing.
    • Baiting (dropping CDs or USB drivers and hoping people use them).
    • Tailgating.
  • Physical
    • Get hard drive access, will it be encrypted?
    • Boot from linux.
    • Brute force password.
    • Keyloggers.
    • Frequency jamming (bluetooth/wifi).
    • Covert listening devices.
    • Hidden cameras.
    • Disk encryption.
    • Trusted Platform Module.
    • Spying via unintentional radio or electrical signals, sounds, and vibrations (TEMPEST - NSA).
  • Network
    • Nmap.
    • Find CVEs for any services running.
    • Interception attacks.
    • Getting unsecured info over the network.

Exploit Kits and drive-by download attacks

Remote Control

Remote code execution and privilege.

Bind shell (opens port and waits for attacker).

Reverse shell (connects to port on attackers C2 server).

Spoofing

Email spoofing.

IP address spoofing.

MAC spoofing.

Biometric spoofing.

ARP spoofing.

Tools

Metasploit.

ExploitDB.

Shodan - Google but for devices/servers connected to the internet.

Google the version number of anything to look for exploits.

Hak5 tools.

Look at MITRE attack matrix

https://attack.mitre.org/

Pentest Experience Questions

How would you start a new pen test?

What is your your all-time favorite bug that you found?

What is your favorite tool, and why?

What is your least favorite tool, and why?

Do you have any tool you've written?

Have you attend any bug bounty program?

Malware & Reversing

Interesting malware

Conficker.

Morris worm.

Zeus malware.

Stuxnet.

Wannacry.

CookieMiner.

Sunburst.

Malware features

Various methods of getting remote code execution.

Domain-flux.

Fast-Flux.

Covert C2 channels.

Evasion techniques (e.g. anti-sandbox).

Process hollowing.

Mutexes.

Multi-vector and polymorphic attacks.

RAT (remote access trojan) features.

Decompiling/ reversing

Obfuscation of code, unique strings (you can use for identifying code).

IdaPro, Ghidra.

Static / dynamic analysis

Describe the differences.

Virus total.

Reverse.it.

Hybrid Analysis.