Network Scan & Map

Network Scanning

Network scanning is the process of gathering information about computing systems on a network. It is used mostly for assessing system security and performing maintenance, but can also be used by hackers to attack the network. Network scanning is usually the first step in active reconnaissance, where the attacker seeks to discover potentially vulnerable targets. […]

Pentest

Pen Testing Overview

Pen Testing Standards and Frameworks Several sets of standards and frameworks have been developed to provide a common base of understanding and expectation for pen tests. Some examples have been listed below. CHECK framework The Open Web Application Security Project (OWASP) Testing Framework Open Source Security Testing Methodology Manual (OSSTMM) Penetration Testing Execution Standard (PTES) […]

Tools Web App Attack

SQLMap

https://sqlmap.org/ Useful commands -u URL, –url=URL     Target URL (e.g. “www.target.com/vuln.php?id=1”)–data=DATA Data string to be sent through POST-p TESTPARAMETER Testable parameter(s) README.pdf/usr/share/sqlmap/doc/README.pdf Example command to call sqlmap to scan a URL with the opening at the search parameter using a UNION based attack technique At the end of that command set some more properties […]

Network Attack

Telnet

If this service is running, it is a bright red flag that should be looked into immediately. Telnet does not require credentials. TryHackMe has a paid room that teaches Telnet. https://tryhackme.com/room/networkservices Telnet is an application protocol which allows the use of a telnet client to connect and execute commands on a remote machine that’s hosting […]