by a threat actor, such as an attacker, to cross privilege boundaries within a computer system. Attack Surface • The attack surface of a software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment. CVE • Common Vulnerabilities and Exposures CVSS • Common Vulnerability Scoring System 35
pentest, is a simulation of cyber attack against the computer system to check for exploitable vulnerability. • Hardware • Website • Information system • Other equipment 41
available • The information within this section is the result of the many years of combined experience of some of the most successful penetration testers in the world 43
almost entirely by automated tools • Level 2 • Using automated tools from level 1 and some manual analysis • Level 3 • Think cultivating relationships on SocNet, heavy analysis, deep understanding of business relationships, most likely a large number of hours to accomplish the gathering and correlation
testing • The model used be consistent in terms of its representation of threats, their capabilities, their qualifications • Per the organization being tested • The ability to repeatedly be applied too future test with the same results 46
Identify and categorize primary and secondary assets • Identify and categorize threats and threat communities • Map threat communities against primary and secondary assets
escalation • Cleaning tracks and staying undetected • Collecting system information and data • Setting up backdooring and rootkits • Pivoting to penetrate internal networks
---------- - ? Help men u banner Display an awesome metasploit banne r cd Change the current working director y color Toggle colo r connect Communicate with a hos t debug Display information useful for debuggin g exit Exit the consol e features Display the list of not yet released features that can be opted in t o get Gets the value of a context-specific variabl e getg Gets the value of a global variabl e grep Grep the output of another comman d help Help men u history Show command histor y load Load a framework plugi n quit Exit the consol e repeat Repeat a list of command s route Route traffic through a sessio n save Saves the active datastore s sessions Dump session listings and display information about session s set Sets a context-specific variable to a valu e setg Sets a global variable to a valu e sleep Do nothing for the specified number of second s spool Write console output into a file as well the scree n threads View and manipulate background thread s tips Show a list of useful productivity tip s unload Unload a framework plugi n unset Unsets one or more context-specific variable s unsetg Unsets one or more global variable s version Show the framework and console library version numbers
---------- - advanced Displays advanced options for one or more module s back Move back from the current contex t clearm Clear the module stac k info Displays information about one or more module s listm List the module stac k loadpath Searches for and loads modules from a pat h options Displays global options or for one or more module s popm Pops the latest module off the stack and makes it activ e previous Sets the previously loaded module as the current modul e pushm Pushes the active or list of modules onto the module stac k reload_all Reloads all modules from all defined module path s search Searches module names and description s show Displays modules of a given type, or all module s use Interact with a module by name or search term/index
COMMAND [ARGS].. . Options : -h, --help Show this message and exit . Commands : alert Manage the network alerts for your accoun t convert Convert the given input data file into a different format . count Returns the number of results for a searc h data Bulk data access to Shoda n domain View all available information for a domai n download Download search results and save them in a compressed JSON.. . honeyscore Check whether the IP is a honeypot or not . host View all available information for an IP addres s info Shows general information about your accoun t init Initialize the Shodan command-lin e myip Print your external IP addres s org Manage your organization's access to Shoda n parse Extract information out of compressed JSON files . radar Real-Time Map of some results as Shodan finds them . scan Scan an IP/ netblock using Shodan . search Search the Shodan databas e stats Provide summary information about a search quer y stream Stream data in real-time . version Print version of this tool .
output • IP • Port • Hostname • Data Usage: shodan search [OPTIONS] <search query > Search the Shodan databas e Options : --color / --no-colo r --fields TEXT List of properties to show in the search results . --limit INTEGER The number of search results that should be returned . Maximum: 100 0 --separator TEXT The separator between the properties of the searc h results . -h, --help Show this message and exit.
of file extensions intitle • Used to search for various keywords inside the title intext • Useful to locate pages that contain certain characters or strings inside their text 97
who start up this service would be normal user • Any higher privilege commands are controlled by a special father program • Most command used in ftp has integrate into vsftpd 106
arbitrary code via a craft RPC request that triggers the overflow during path canonicalization • Windows 2000 SP4 • Windows XP SP2 and SP3 • Windows Server 2003 SP1 and SP2 • Windos Vista Gold and SP1 • Windows Server 2008 • Windows 7 Pre-Beta 113
arbitrary code via a craft RPC request that triggers the overflow during path canonicalization • Windows 2000 SP4 • Windows XP SP2 and SP3 • Windows Server 2003 SP1 and SP2 • Windos Vista Gold and SP1 • Windows Server 2008 • Windows 7 Pre-Beta 118
set RHOST [IP address] • Set IP Address of Target Windows VM (exploit/windows/smb/ms08-067_netapi)> set LHOST [IP address] • Set IP Address of Kali Linux
not properly handle Heartbeat Extension packet • Allow remote attacker to obtain sensitive information from process memory via crafted packet that trigger buffer over-read 127
}; echo vulnerable’ bash -c “cat /etc/passwd” Legit function definition in BASH environment variable Injection of arbitrary OS command BASH command invoked with on-the-fly defined environment
Lucene library • Developed in Java • It provides a distributed, multitenant-capable full text search engine • HTTP web interface • Schema-free JSON document 155
are allowed by the sandbox are found in GroovySandboxExpressionChecker.java • The function isAuthorized takes in an expression and checks to see if it is allowed to be executed 158
that allows an attacker to compromise the interactions. • Normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform. 211
from the current HTTP request • Stored XSS • The malicious script comes from the website’s database • DOM-based XSS • The vulnerability exists in client-side code rather than server- side code
second-order XSS • When the application receive data from an untrusted source and includes that data within its later HTTP responses in an unsafe way. 217