D4nk0St0rM / ethical_hacking

Ethical Hacking & PenTesting Repo method, approach, resources, tools, code, exploits, reporting, wordlists, attacks, scanning

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Typing SVG



List of applications for installation that are helpful / required for some tools

for i in $(cat list); do sudo apt install $i -y; done


Method

Reconnaissance and scanning / Enumeration are the most important step

  • Client Risk analysis
    • Consider specific risk level for areas of client concern
    • design pentest based on client risk areas
  • Intel gathering / Perform Reconnaissance
  • Scanning and Enumeration
    • nmap scan — review findings
    • Port 80/443 or Web App Pentesting
      • /etc/hosts — run Nikto
      • run FFuF or sublist3r
      • Broken Access Control
      • source code
      • Cross Site Scripting (XSS)
      • SQL Injection
    • review the other open ports/services for potential initial attack vectors
      • Port 21 (FTP) login anonymously and download or upload files
      • Port 22 (SSH) brute force the credentials and login
      • Port 5985 (Windows Remote Management (WinRM) any credentials to use EvilWinRM or crackmapexec
  • Gaining access / Exploitation
  • Maintain access
  • Cover tracks and insert backdoors

To remember

  • document and screenshot

Summary of Standard Toolset

  • BloodHound: Displays visual of AD environment
  • CrackMapExec: Do Some Research
  • Impacket: Great for abusing Windows Network Protocols
  • LinPEAS: Displays Lin Priv Esc Vectors
  • WinPEAS: Displays Windows Priv Esc Vectors
  • PowerView: Allows for enumeration of an AD environment
  • PowerUp: Displays Windows Priv Esc Vectors based on system misconfigs
  • Mimikatz: Credential Stealer
  • Chisel/SSHuttle: Port Forwarding (pivoting)
  • hashcat / John : Cracking hashes

About

Ethical Hacking & PenTesting Repo method, approach, resources, tools, code, exploits, reporting, wordlists, attacks, scanning

License:MIT License


Languages

Language:Python 54.3%Language:PowerShell 31.5%Language:Shell 4.7%Language:Assembly 4.6%Language:C 2.6%Language:C# 1.0%Language:ASP.NET 0.5%Language:PHP 0.5%Language:Classic ASP 0.2%Language:C++ 0.1%Language:Jupyter Notebook 0.0%Language:HTML 0.0%Language:XSLT 0.0%Language:JavaScript 0.0%