How I Would Hack You and Attack You
How I Would Hack You and Attack You
attack you
Tags checklist server
Introduction
Recon
Social media hacking
Port me like on of your french girls
Tell the doctor where it hurts!
Discovering an epic end
I've got some BeEF with you!
XSS the night away
SQLi me a slice of pie!
The only logical conclussion
Introduction
Whenever i am on a pentest, there are always several ways i approach my target.
Please note how i mentioned penesting and no bug bounties as those are two totally
different beasts. Pentesting makes it a lot easier in my opinion to find vulnerabililities but
don't let that discourage you to do bug bounty hunting because while it might be true
that pentesters find more issues, a lot of them are low priority or have less impact and
as if that was not enough, een pentester needs to be pretty complete.
Recon
Recon recon recon, i can't stress enough how important this part of my hacking cycle is.
To hack a target i need to have as much information as possible and for me this all
starts with trying to map hidden attacke surface. A lot of people don't realise this but
social media accounts are a prime target for me so i will try to link data i have to existing
social media accounts.
Moral of the story: Disable security questions and opt for a back-up adress instead such
as alternative phone number and alternative email adress.
If broad scope i will use masscan, The only problem i have with the tool is that i will
need to specificy what ports to scan. To get around this, make a file that contains a
list of common ports that you always scan for so that you can re-use that file.
From the previous step note down all the information you can think of, webservers,
versions of webservers, network topologie, etc...
I'll run all the tools in my arsenal but prefer this order of importance:
Nikto to tell me more information about the webserver and it's possible
vulnerabilities + burp suite pro scanner.
I will also look up all the port numbers, what the default applications are on there and
how to hack them, keeping a special eye on version numbers of applications which i will
litteraly google "how to hack x" or "exploit software 3.2.10". This will often lead me to
exploit-db where i can also look at the google dorks to get some inspiration on how to
hack your machine.
You have no idea how often I find entry into your HDD by using outdated software!(Hint:
It's wayyyy too often. )