{"id":1072,"date":"2021-04-15T11:31:09","date_gmt":"2021-04-15T15:31:09","guid":{"rendered":"https:\/\/increasec.com\/?p=1072"},"modified":"2022-10-03T12:52:17","modified_gmt":"2022-10-03T16:52:17","slug":"how-to-pentest","status":"publish","type":"post","link":"https:\/\/increasec.com\/?p=1072","title":{"rendered":"How to Pentest"},"content":{"rendered":"\n<p>Prep:<\/p>\n\n\n\n<p>I like to break a pentest into a few categories: <br>Intruder Scope: who is able to do this attack?  Entire Internet (worst) \/ Local Area (think Wifi) \/ Targeted (USB stick dropped in your parking lot, very narrow)<br>For a first audit i would focus on Internet scope and maybe put a little time into Wifi.<\/p>\n\n\n\n<p>What info can I get from their website?  phone #?   HTTPS?<br>   are Email addresses protected from webcrawlers?   browse to  Https:\/\/websitename\/robots.txt    investigate<br>   if documents are public, a tool like <a href=\"https:\/\/github.com\/ElevenPaths\">FOCA <\/a>can read the metadata to retrieve email addresses and employee names<br>Google search them.  Find their CEO name.  Google search them.  Linked-in them.<br>https:\/\/www.seoptimer.com     enter the website name, note item in the security section.  doesn&#8217;t do a good job of finding email addresses.<br>in the technology section; look for platforms that are easy to compromise ie WordPress.  google search the platforms + vulnerability<br>https:\/\/www.dnsinspect.com      look for red items, look for an SPF record<br>https:\/\/hunter.io   enter website name, note which other websites this email appears on<br><strong>mxtoolbox.com<\/strong>    a record search, note hosting provider<br>lookup MX record, who hosts their email, <strong>check email health<\/strong>!<br>linkedin.com   search for names<br>dnsdumpster.com creates a nice visual map of DNS tree<\/p>\n\n\n\n<p>https:\/\/lookup.icann.org\/lookup    enter a domain name and find their DNS registrar<\/p>\n\n\n\n<p>https:\/\/securitytrails.com  requires creating an account but lots of information in 1 spot<\/p>\n\n\n\n<p>put a mailinator.com email address into every reset-your-password box to see if the message is different for valid\/invalid email addresses.<\/p>\n\n\n\n<p>tracing pixel send by email can determine their public ip address<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Internal:<\/p>\n\n\n\n<p>Kali Linux will tell you SSH is started,  it LIES<br>sudo service ssh start<br>ip address (linux) or ipconfig \/all (windows)<br>            DHCP will give you a DNS server, may also be a domain controller, lets verify<br>nmap &#8211;script=ldap* IP-Addresss-Of-Dns-Server<br>            this should return a bunch of info, if it includes a DN, this is a domain controller<\/p>\n\n\n\n<p>| ldap-rootdse:<br>| LDAP Results<br>|<br>| domainFunctionality: 6<br>| forestFunctionality: 6<br>| domainControllerFunctionality: 7<br>| rootDomainNamingContext: DC=my,DC=domain,DC=com<br>|<\/p>\n\n\n\n<p><br>nmap &#8211;script=smb2-security-mode target.dns.name.or.IP     (or a range of ip addresses)<br>            | smb2-security-mode:<br>            | 2.02:<br>            |_ Message signing <strong><span class=\"has-inline-color has-vivid-red-color\">enabled but not required<\/span><\/strong><\/p>\n\n\n\n<p>nmap &#8211;script=broadcast-wpad*<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p> <blockquote class=\"wp-embedded-content\" data-secret=\"t3yKdfp680\"><a href=\"https:\/\/research.securitum.com\/nmap-and-12-useful-nse-scripts\/\">Nmap and 12 useful NSE scripts<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Nmap and 12 useful NSE scripts&#8221; &#8212; research.securitum.com\" src=\"https:\/\/research.securitum.com\/nmap-and-12-useful-nse-scripts\/embed\/#?secret=NJ8I84zpjk#?secret=t3yKdfp680\" data-secret=\"t3yKdfp680\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prep: I like to break a pentest into a few categories: Intruder Scope: who is able to do this attack? Entire Internet (worst) \/ Local Area (think Wifi) \/ Targeted&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[168,4],"class_list":["post-1072","post","type-post","status-publish","format-standard","hentry","category-uncategorised","tag-audit","tag-security"],"_links":{"self":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/1072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1072"}],"version-history":[{"count":17,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/1072\/revisions"}],"predecessor-version":[{"id":2219,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/1072\/revisions\/2219"}],"wp:attachment":[{"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}