Good info web sites
1. SANS Penetration Testing
https://pen-testing.sans.org/blog/pen-testing
2. Dan McInerney
pentest Scripts
3. The search engine for Webcams
Shodan is the world's first search engine for
Internet-connected devices
From
<https://www.shodan.io/> 4. Internet Security and Data Mining
From <https://www.netcraft.com/>
5. How Penetration Testers Use Google Hacking from
https://www.alienvault.com/blogs/security-essentials/how-pen-testers-use-google-hacking
6. http://codebazaar.blogspot.com/2011/06/introduction-to-metasploit-and-armitage.html
Here are some interesting resources for further reading:
- offensive-security.com - online courses on Metasploit
- pentest.cryptocity.net - online courses for Penetration Testing and Vulnerability Analysis currently taught at the Polytechnic Institute of New York University
- http://www.ethicalhacker.net/content/view/379/2/
Further Resources
The following resources were mentioned throughout these lectures:- Metasploit Unleashed Course
- Metasploit: The Penetration Tester's Guide
- Metasploit Homepage
- Armitage Documentation and Resources
- BackTrack Linux
- Penetration Testing and Vulnerability Analysis Class at NYU:Poly
7. OSCP Prep
https://www.reddit.com/r/oscp/
Syllabus
8. Penetration Testing Tools Cheat Sheet
9. https://theartofhacking.org/guide/
10. Pentest Steps
Phase 1 | Reconnaissance
12 Hacking and security: OSCP - Windows Priviledge Escalation
8. Penetration Testing Tools Cheat Sheet
9. https://theartofhacking.org/guide/
10. Pentest Steps
Phase 1 | Reconnaissance
Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack. Reconnaissance can be performed actively (meaning that you are directly touching the target) or passively (meaning that your recon is being performed through an intermediary).
Phase 2 | Scanning
The phase of scanning requires the application of technical tools to gather further intelligence on your target, but in this case, the intel being sought is more commonly about the systems that they have in place. A good example would be the use of a vulnerability scanner on a target network.
The phase of scanning requires the application of technical tools to gather further intelligence on your target, but in this case, the intel being sought is more commonly about the systems that they have in place. A good example would be the use of a vulnerability scanner on a target network.
Phase 3 | Gaining Access
Phase 3 gaining access requires taking control of one or more network devices in order to either extract data from the target, or to use that device to then launch attacks on other targets.
Phase 3 gaining access requires taking control of one or more network devices in order to either extract data from the target, or to use that device to then launch attacks on other targets.
Phase 4 | Maintaining Access
Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible. The attacker must remain stealthy in this phase, so as to not get caught while using the host environment.
Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible. The attacker must remain stealthy in this phase, so as to not get caught while using the host environment.
Phase 5 | Covering Tracks
The final phase of covering tracks simply means that the attacker must take the steps necessary to remove all semblance of detection. Any changes that were made, authorizations that were escalated etc. all must return to a state of non-recognition by the host network’s administrators.
11. Webgoat 8 solutions
a) https://www.youtube.com/watch?v=9VOB34pcnY0&list=PLrHVSJmDPvlqxCfBhPuksHdpViPyeZTsF&index=1412 Hacking and security: OSCP - Windows Priviledge Escalation
Comments
Post a Comment