Skip to content

eniac888/Kali-Linux-Pentest-Basic

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Kali-Linux-Pentest-Basic

PowerPonit of "Kali Linux Pentest Basic"

Read first: These slides contains basis phases of Penetration Testing(Pentest) on Kali Linux which caused me about 3 days to summarize. For a better present, I just made some practical demonstration with the running servers in the real world.But please do not damage them or take any illegal actions while viewing the slides. For the world's peace and our belief.Thank you !

Some of contents copied from Internet may contains unauthorized info. If it does,please contact me at the time by e-mail.(master@sysorm.xyz)

Index:

Phase1 Reconnaissance

1、Website & Server Info acquiring	-Server :	whois\host\fierce(DNS Rev)\dig\DNS transfer	-Server/OS fingerprint	port scan\Banner\p0f\Xprobe2\nmap	-Waf detected	wafw00f 2、Search Engine	-Google Advanced	-Shodan	-Zoomeye 3、Google Hacking(GHDB)	-intext\allintext\intitle\cache\intitile\define\filetype\info\inurl\allinurl\+_*."" 4、Social Media Network	-Maltego 5、Undisclosed Data(Social Engine Database)	-QQGroup 

Phase2 Scanning

1、Network traffic	-tcp\udp\icmp 2、Nmap	-OS detected\TCP scan\SYN scan\ACK scan\UDP scan\Timming tpl	-Port scan\IP scan\output 3、Hping3	-SYN Flood Attack(Denial of Service) 4、Nessus 5、whatweb	-Gather info of Website 6、DirBuster	-scan the exists directories or files 7、joomscan	-Joomla based sites tests 8、WPScan	-Wordpress based sites tests 

Phase3 Gaining Access

1、Metasploit Framework	-Experiment:Hack Windows XP SP3 by MS08_067	-Get shell/Remote Desktop/Remote control 2、Sqlmap	-SQLi Experiment:Hack a CMS Site	-Get shell/dump database/Remote control 3、rdesktop + hydra	-Forcely Brute WinXP Administrator Password 4、Arpspoof	-Experiment:Arp spoof Attack on LAN	-Session Injection 5、tcpdump + ferret + hamster	-Experiment:Session Injection 6、Ettercap	-Experiment:DNS Spoof(Fishing) 7、SET	-With Meterpreter 

Phase4 Maintaining Access

1、Netcat	-Experiment:Reverse CMDshell(cmd.exe) 2、Crytpcat 3、weevely	-Generated Shellcode Bypassed Anti-Virus	-Experiment:Break through Interception by SafetyDog 4、cymothoa	-Process Injection 

Phase5 Pentest Report

1、Magictree 2、dradis 

About

PowerPonit of "Kali Linux Pentest Basic"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors