博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
An overview of network penetration testing
阅读量:5995 次
发布时间:2019-06-20

本文共 3203 字,大约阅读时间需要 10 分钟。

1、 an SQLi vulnerability will allow you  to do the  following 

  •    query the database using select statement forezample users table. you might get the password or usersname
  •    Bypass the login page executing successfuly query results
  •    Execute system commands in the database in oreder compromise the web server
  •    Execute inserts.delete commands to manipulate the records in the database

2、Command Injection

      we can append other commands after the variable and the application will be to execute it for us , my goal is to make the backend execute someting like this [nslookup [domain name variable ] && [other command ]

3、OWASP top 10

    Injection-----> when a attacker can inject and execute a custom command in the backend because of missing sanitization,besides it ,command Injection are more like LDAP、XPath、NoSQLo  XML Parsers、STMTP Header

    Broken Authentication  ------> a hacker finds the user's idntity, credentials bouth name and password or web session

   Sesitive Data 、   XML External Entities  \ Broken Access Control \ Security Misconfig \Cross-site Scripting \ Insecure Deserialization \ Using Components with know vulnerability\ Insufficient logging

4、邮件信息收集

theharverster -d [目标网络域名地址] -l [邮件地址数量] -b [使用的搜索的公共知识库]  eg : theharvester  -d yalong.cn -l 20 -b baidu

5、 use Whois search DNS and ip register name and phone number and email

   step one we can use the  Whois.net  the url: http:www.whois.net   or another website is NetCraft   the url :https://www.netcraft.com/

   step two:  use the command  whois ,the screenshout as follow

another wegit tools is host it can translate ip to hostname

nslookup id find DNS

6、Reconnaissance or information gathering

  a pen tester gather information an attacker's perspective ,anything that is useful is necessary to be collected:

  •      network Digrams、 application and their version、security defences such IDS IPS
  •      IP address     baidu & Social or perfessional networking websites
  •      Domain names \sites\ Monster.com 、 IP  Registries 、DNS registrars  \
  •      Device name the company websites

7、nslookup is a windows tool to find the ip address associated with the given domain name

8、Scanning  to finding  live  address

   ICMP scanning  use command  Nmap -sP [ip range]   、 SYN scanning  Commands Nmap -sS -P0 [ip range]    、all port scanning  commamds Nmap -sS  -p1=65535 -P0 -max-rtt-timeout<time> [iprange]

 Specific Prot scanning  we know the ususlly port  80` 443  wecan use command Nmap -sS -p80,443 -P0 [ip range]

9、OS ans service FingerPrintering

   OS detecting is to be done find out the system ,by which know vulnerabilities can be exploited .we can use the commands Namp -O [ip range ]  or use Namp -sS -sV -O -P0[ip range]  of cose can use the comand to find all port Nmap -sS -sV -O -P0 -p1-65535 -max-rrt-timeout<time> [ip range]   

10、Vulnerability  Scanning

   Nmap has the vulnerability scan switch ,we can run the nmap vulnerability scan the command ;   nmap -sS --sV -P0 -p1 -65535 -A --max-rate 500 --reason iL<inputfile.txt><outputfile.txt> 

    another way we can use nessus nskipfish ,BurpSuite

11、make a conclusion

   The reported Vulnerability have to to be tested manually and  confirmed since the vulnerability repprted by the scanners my be false positives at times.

 

转载于:https://www.cnblogs.com/xinxianquan/p/10208413.html

你可能感兴趣的文章
《从零构建前后分离的web项目》:前端1.0 终 - 前端性能优化 (多图预警)
查看>>
什么都不做就能赚钱?Airbnb靠什么牛逼的技术赚全世界人的钱?
查看>>
读Zepto源码之操作DOM
查看>>
【代码之外】一个过来人聊聊程序员考研
查看>>
少年,我看你骨骼精奇,见与你有缘,这套算法赠你
查看>>
彻底理解volatile
查看>>
React Native 解决 Navigator.pop 无法传参数
查看>>
二级指针与ARC不为人知的特性
查看>>
如何合并两个TensorFlow模型
查看>>
移动端数据统计,精细化运营的永动机
查看>>
Electron Cash钱包存BCH教程
查看>>
iOS Tagged Pointer (源码阅读必备知识)
查看>>
RxSwift的使用详解02
查看>>
原码,补码,反码
查看>>
Object assign()
查看>>
Java生成二维码
查看>>
JDBC 批量插入数据优化, 使用 addBatch 和 executeBatch
查看>>
设置Tabbar和NavigationBar的颜色
查看>>
攻击JavaWeb应用[5]-MVC安全
查看>>
Java 各种锁的小结
查看>>