Penetration Testing with Kali Linux



Similar documents
Vulnerability Assessment and Penetration Testing

Learn Ethical Hacking, Become a Pentester

Audience. Pre-Requisites


PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

June 2014 WMLUG Meeting Kali Linux

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Penetration Testing Report Client: Business Solutions June 15 th 2015

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

CRYPTUS DIPLOMA IN IT SECURITY

(WAPT) Web Application Penetration Testing

Internal Penetration Test

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Build Your Own Security Lab

Information Security. Training

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

How to hack a website with Metasploit

CYBERTRON NETWORK SOLUTIONS

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Certified Ethical Hacker (CEH)

Attack and Penetration Testing 101

Cyber Essentials. Test Specification

Attack Frameworks and Tools

INFORMATION SECURITY TRAINING CATALOG (2015)

1 Scope of Assessment

Professional Penetration Testing Techniques and Vulnerability Assessment ...

McAfee Certified Assessment Specialist Network

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

1. LAB SNIFFING LAB ID: 10

Network Security. Network Packet Analysis

Certified Cyber Security Expert V Web Application Development

DenyAll Detect. Technical documentation 07/27/2015

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Topics in Network Security

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Security Considerations White Paper for Cisco Smart Storage 1

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Ethical Hacking and Attack Tools

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

The Nexpose Expert System

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Penetration Testing Walkthrough

Description: Objective: Attending students will learn:

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Security of IPv6 and DNSSEC for penetration testers

VMware: Advanced Security

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

STABLE & SECURE BANK lab writeup. Page 1 of 21

TUNNA. A tool designed to bypass firewall restrictions on remote webservers. By: Rodrigo Marcos Nikos Vassakis

April 11, (Revision 2)

Evaluation of Penetration Testing Software. Research

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

CEH Version8 Course Outline

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

2016 TÜBİTAK BİLGEM Cyber Security Institute

Deciphering The Prominent Security Tools Ofkali Linux

Penetration Testing Lessons Learned. Security Research

INFORMATION SECURITY TRAINING CATALOG (2016)

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Web Application Security

Web App Security Audit Services

Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS

Application Security Testing

Penetration Testing Workshop

Hands-on Hacking Unlimited

Penetration Test Report

Client logo placeholder XXX REPORT. Page 1 of 37

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Introduction to Network Penetration Testing

Network Traffic Analysis

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Contents 1 Description 2 Installation

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Using Nessus In Web Application Vulnerability Assessments

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

IBM. Vulnerability scanning and best practices

Linux Network Security

Proxies. Chapter 4. Network & Security Gildas Avoine

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Ethical Hacking Course Layout

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Creation of Pentesting Labs

Network Security Audit. Vulnerability Assessment (VA)

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Transcription:

Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11

All rights reserved to Offensive Security, 2014 No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright owner, including photocopying and all other copying, any transfer or transmission using any network or other means of communication, any broadcast for distant learning, in any form or by any means such as any information storage, transmission or retrieval system, without prior written permission from the author. PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 2 of 11

0. - Penetration Testing: What You Should Know 0.1 - About Kali Linux 0.2 - About Penetration Testing 0.3 - Legal 0.4 - The megacorpone.com Domain 0.5 - Offensive Security Labs 0.5.1 - VPN Labs Overview 0.5.2 - Lab Control Panel 0.5.3 - Reporting 1. - Getting Comfortable with Kali Linux 1.1 - Finding Your Way Around Kali 1.1.1 - Booting Up Kali Linux 1.1.2 - The Kali Menu 1.1.3 - Find, Locate, and Which 1.1.4 - Exercises 1.2 - Managing Kali Linux Services 1.2.1 - Default root Password 1.2.2 - SSH Service 1.2.3 - HTTP Service 1.2.4 - Exercises 1.3 - The Bash Environment 1.4 - Intro to Bash Scripting 1.4.1 - Practical Bash Usage Example 1 1.4.2 - Practical Bash Usage Example 2 1.4.3 - Exercises 2. - The Essential Tools 2.1 - Netcat 2.1.1 - Connecting to a TCP/UDP Port 2.1.2 - Listening on a TCP/UDP Port PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 3 of 11

2.1.3 - Transferring Files with Netcat 2.1.4 - Remote Administration with Netcat 2.1.5 - Exercises 2.2 - Ncat 2.2.1 - Exercises 2.3 - Wireshark 2.3.1 - Wireshark Basics 2.3.2 - Making Sense of Network Dumps 2.3.3 - Capture and Display Filters 2.3.4 - Following TCP Streams 2.3.5 - Exercises 2.4 - Tcpdump 2.4.1 - Filtering Traffic 2.4.2 - Advanced Header Filtering 2.4.3 - Exercises 3. - Passive Information Gathering A Note From the Author 3.1 - Open Web Information Gathering 3.1.1 - Google 3.1.2 - Google Hacking 3.1.3 - Exercises 3.2 - Email Harvesting 3.2.1 - Exercise 3.3 - Additional Resources 3.3.1 - Netcraft 3.3.2 - Whois Enumeration 3.3.3 - Exercise 3.4 - Recon- ng 4. - Active Information Gathering 4.1 - DNS Enumeration PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 4 of 11

4.1.1 - Interacting with a DNS Server 4.1.2 - Automating Lookups 4.1.3 - Forward Lookup Brute Force 4.1.4 - Reverse Lookup Brute Force 4.1.5 - DNS Zone Transfers 4.1.6 - Relevant Tools in Kali Linux 4.1.7 - Exercises 4.2 - Port Scanning A Note From the Author 4.2.1 - TCP CONNECT / SYN Scanning 4.2.2 - UDP Scanning 4.2.3 - Common Port Scanning Pitfalls 4.2.4 - Port Scanning with Nmap 4.2.5 - OS Fingerprinting 4.2.6 - Banner Grabbing/Service Enumeration 4.2.7 - Nmap Scripting Engine (NSE) 4.2.8 - Exercises 4.3 - SMB Enumeration 4.3.1 - Scanning for the NetBIOS Service 4.3.2 - Null Session Enumeration 4.3.3 - Nmap SMB NSE Scripts 4.3.4 - Exercises 4.4 - SMTP Enumeration 4.4.1 - Exercise 4.5 - SNMP Enumeration A Note From the Author 4.5.1 - MIB Tree 4.5.2 - Scanning for SNMP 4.5.3 - Windows SNMP Enumeration Example 4.5.4 - Exercises 5. - Vulnerability Scanning PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 5 of 11

5.1 - Vulnerability Scanning with Nmap 5.2 - The OpenVAS Vulnerability Scanner 5.2.1 - OpenVAS Initial Setup 5.2.2 - Exercises 6. - Buffer Overflows 6.1 - Fuzzing 6.1.1 - Vulnerability History 6.1.2 - A Word About DEP and ASLR 6.1.3 - Interacting with the POP3 Protocol 6.1.4 - Exercises 7. - Win32 Buffer Overflow Exploitation 7.1 - Replicating the Crash 7.2 - Controlling EIP 7.2.1 - Binary Tree Analysis 7.2.2 - Sending a Unique String 7.2.3 - Exercises 7.3 - Locating Space for Your Shellcode 7.4 - Checking for Bad Characters 7.4.1 - Exercises 7.5 - Redirecting the Execution Flow 7.5.1 - Finding a Return Address 7.5.2 - Exercises 7.6 - Generating Shellcode with Metasploit 7.7 - Getting a Shell 7.7.1 - Exercises 7.8 - Improving the Exploit 7.8.1 - Exercises 8. - Linux Buffer Overflow Exploitation 8.1 - Setting Up the Environment 8.2 - Crashing Crossfire PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 6 of 11

8.2.1 - Exercise 8.3 - Controlling EIP 8.4 - Finding Space for Our Shellcode 8.5 - Improving Exploit Reliability 8.6 - Discovering Bad Characters 8.6.1 - Exercises 8.7 - Finding a Return Address 8.8 - Getting a Shell 8.8.1 - Exercise 9. - Working with Exploits 9.1 - Searching for Exploits 9.1.1 - Finding Exploits in Kali Linux 9.1.2 - Finding Exploits on the Web 9.2 - Customizing and Fixing Exploits 9.2.1 - Setting Up a Development Environment 9.2.2 - Dealing with Various Exploit Code Languages 9.2.3 - Exercises 10. - File Transfers 10.1 - A Word About Anti Virus Software 10.2 - File Transfer Methods 10.2.1 - The Non- Interactive Shell 10.2.2 - Uploading Files 10.2.3 - Exercises 11. - Privilege Escalation 11.1 - Privilege Escalation Exploits 11.1.1 - Local Privilege Escalation Exploit in Linux Example 11.1.2 - Local Privilege Escalation Exploit in Windows Example 11.2 - Configuration Issues 11.2.1 - Incorrect File and Service Permissions 11.2.2 - Think Like a Network Administrator PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 7 of 11

11.2.3 - Exercises 12. - Client Side Attacks 12.1 - Know Your Target 12.1.1 - Passive Client Information Gathering 12.1.2 - Active Client Information Gathering 12.1.3 - Social Engineering and Client Side Attacks 12.1.4 - Exercises 12.2 - MS12-037- Internet Explorer 8 Fixed Col Span ID 12.2.1 - Setting up the Client Side Exploit 12.2.2 - Swapping Out the Shellcode 12.2.3 - Exercises 12.3 - Java Signed Applet Attack 12.3.1 - Exercises 13. - Web Application Attacks 13.1 - Essential Iceweasel Add- ons 13.2 - Cross Site Scripting (XSS) 13.2.1 - Browser Redirection and IFRAME Injection 13.2.2 - Stealing Cookies and Session Information 13.2.3 - Exercises 13.3 - File Inclusion Vulnerabilities 13.3.1 - Local File Inclusion 13.3.2 - Remote File Inclusion 13.4 - MySQL SQL Injection 13.4.1 - Authentication Bypass 13.4.2 - Enumerating the Database 13.4.3 - Column Number Enumeration 13.4.4 - Understanding the Layout of the Output 13.4.5 - Extracting Data from the Database 13.4.6 - Leveraging SQL Injection for Code Execution 13.5 - Web Application Proxies PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 8 of 11

13.5.1 - Exercises 13.6 - Automated SQL Injection Tools 13.6.1 - Exercises 14. - Password Attacks 14.1 - Preparing for Brute Force 14.1.1 - Dictionary Files 14.1.2 - Key- space Brute Force 14.1.3 - Pwdump and Fgdump 14.1.4 - Windows Credential Editor (WCE) 14.1.5 - Exercises 14.1.6 - Password Profiling 14.1.7 - Password Mutating 14.2 - Online Password Attacks 14.2.1 - Hydra, Medusa, and Ncrack 14.2.2 - Choosing the Right Protocol: Speed vs. Reward 14.2.3 - Exercises 14.3 - Password Hash Attacks 14.3.1 - Password Hashes 14.3.2 - Password Cracking 14.3.3 - John the Ripper 14.3.4 - Rainbow Tables 14.3.5 - Passing the Hash in Windows 14.3.6 - Exercises 15. - Port Redirection and Tunneling 15.1 - Port Forwarding/Redirection 15.2 - SSH Tunneling 15.2.1 - Local Port Forwarding 15.2.2 - Remote Port Forwarding 15.2.3 - Dynamic Port Forwarding 15.3 - Proxychains PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 9 of 11

15.4 - HTTP Tunneling 15.5 - Traffic Encapsulation 15.5.1 - Exercises 16. - The Metasploit Framework 16.1 - Metasploit User Interfaces 16.2 - Setting up Metasploit Framework on Kali 16.3 - Exploring the Metasploit Framework 16.4 - Auxiliary Modules 16.4.1 - Getting Familiar with MSF Syntax 16.4.2 - Metasploit Database Access 16.4.3 - Exercises 16.5 - Exploit Modules 16.5.1 - Exercises 16.6 - Metasploit Payloads 16.6.1 - Staged vs. Non- Staged Payloads 16.6.2 - Meterpreter Payloads 16.6.3 - Experimenting with Meterpreter 16.6.4 - Executable Payloads 16.6.5 - Reverse HTTPS Meterpreter 16.6.6 - Metasploit Exploit Multi Handler 16.6.7 - Revisiting Client Side Attacks 16.6.8 - Exercises 16.7 - Building Your Own MSF Module 16.7.1 - Exercise 16.8 - Post Exploitation with Metasploit 16.8.1 - Meterpreter Post Exploitation Features 16.8.2 - Post Exploitation Modules 17. - Bypassing Antivirus Software 17.1 - Encoding Payloads with Metasploit 17.2 - Crypting Known Malware with Software Protectors PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 10 of 11

17.3 - Using Custom/Uncommon Tools and Payloads 17.4 - Exercise 18. - Assembling the Pieces: Penetration Test Breakdown 18.1 - Phase 0 Scenario Description 18.2 - Phase 1 Information Gathering 18.3 - Phase 2 Vulnerability Identification and Prioritization 18.3.1 - Password Cracking 18.4 - Phase 3 Research and Development 18.5 - Phase 4 Exploitation 18.5.1 - Linux Local Privilege Escalation 18.6 - Phase 5 Post- Exploitation 18.6.1 - Expanding Influence 18.6.2 - Client Side Attack Against Internal Network 18.6.3 - Privilege Escalation Through AD Misconfigurations 18.6.4 - Port Tunneling 18.6.5 - SSH Tunneling with HTTP Encapsulation 18.6.6 - Looking for High Value Targets 18.6.7 - Domain Privilege Escalation 18.6.8 - Going for the Kill PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 11 of 11