Penetration Testing Notes
Second brain for hackers
always set IP
in your env
Initial Enumeration
Nmap
If you looking for nmap script in Kali Linux:
/usr/share/nmap/script
Fast Scan
Full TCP Scan
save the output to all_tcp_port
UDP Scan
So many port available? scan with this
OS Enumeration
Nmap Over Proxy
Well Known Ports
http://www.onepage.co.kr/wordpress/index.php/2015/12/22/well-known-ports/
DNS Enumeration
Find IP Address
Brute Force
DNS Zone Transfer
Bash script for DNS zone transfer, save to dns-axfr.sh
, then run with this command ./dns-axfr.sh example.com
Another simple way using DNSRecon
Passive Enumeration
Whois
https://whois.domaintools.com/
other whois --> whois.arin.net
Google Dorking
more information about google dorking:
Netcraft
Recon-ng
recon/domains-hosts/google_site_web and recon/hosts-hosts/resolve
Open-Source Code
search on github filename:users filename:config
automated tools --> gitrob, gitleaks, or recon-ng (with modules) this automated tools are based on regex, entropy for search userful information.
Shodan
search
Security Headers Scanner
https://securityheaders.com/ (scan with this)
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
Pastebin
https://pastebin.com/
Email harvesting
-b : data source
Password Dumps
Social Media
Keywords Search
twitter: https://digi.ninja/projects/twofi.php
linkedin: linkedin2username
Still stuck? go here if you get stuck in your mind
Stack Overflow
search a question related with company. You can search for a user who work at the target company an look at their questions about code or software error.
OSINT Framework
go here if you get stuck in your mind
ASN Lookup
Firewall Detection
fire up wireshark
try to nc the existing port and the closed port in the target machine. If it comes differently, maybe there is a firewall.
secretdump.py
if you found a file ntds.dit
(backup of the AD)
--> ntds.dit is a AD database, encrypt with SECURITY as key, and key encrypted by SYSTEM
if you found file sam.bak
and system.bak
run the secretdump.py and get the SAM hashes
Last updated