PowerPonit of "Kali Linux Pentest Basic"
Read first: These slides contains basis phases of Penetration Testing(Pentest) on Kali Linux which caused me about 3 days to summarize. For a better present, I just made some practical demonstration with the running servers in the real world.But please do not damage them or take any illegal actions while viewing the slides. For the world's peace and our belief.Thank you !
Some of contents copied from Internet may contains unauthorized info. If it does,please contact me at the time by e-mail.(master@sysorm.xyz)
Index:
Phase1 Reconnaissance
1、Website & Server Info acquiring -Server : whois\host\fierce(DNS Rev)\dig\DNS transfer -Server/OS fingerprint port scan\Banner\p0f\Xprobe2\nmap -Waf detected wafw00f 2、Search Engine -Google Advanced -Shodan -Zoomeye 3、Google Hacking(GHDB) -intext\allintext\intitle\cache\intitile\define\filetype\info\inurl\allinurl\+_*."" 4、Social Media Network -Maltego 5、Undisclosed Data(Social Engine Database) -QQGroup Phase2 Scanning
1、Network traffic -tcp\udp\icmp 2、Nmap -OS detected\TCP scan\SYN scan\ACK scan\UDP scan\Timming tpl -Port scan\IP scan\output 3、Hping3 -SYN Flood Attack(Denial of Service) 4、Nessus 5、whatweb -Gather info of Website 6、DirBuster -scan the exists directories or files 7、joomscan -Joomla based sites tests 8、WPScan -Wordpress based sites tests Phase3 Gaining Access
1、Metasploit Framework -Experiment:Hack Windows XP SP3 by MS08_067 -Get shell/Remote Desktop/Remote control 2、Sqlmap -SQLi Experiment:Hack a CMS Site -Get shell/dump database/Remote control 3、rdesktop + hydra -Forcely Brute WinXP Administrator Password 4、Arpspoof -Experiment:Arp spoof Attack on LAN -Session Injection 5、tcpdump + ferret + hamster -Experiment:Session Injection 6、Ettercap -Experiment:DNS Spoof(Fishing) 7、SET -With Meterpreter Phase4 Maintaining Access
1、Netcat -Experiment:Reverse CMDshell(cmd.exe) 2、Crytpcat 3、weevely -Generated Shellcode Bypassed Anti-Virus -Experiment:Break through Interception by SafetyDog 4、cymothoa -Process Injection Phase5 Pentest Report
1、Magictree 2、dradis