pentesting_1_information_gathering
pentesting_1_information_gathering
Google Hacking
Single out specific pages with this in title intitle:"VNC viewer for Java"
Searching for compromised machines for known PHP vuln intitle:"-N3t" filetype:php
undetectable
#!/bin/bash
reverse.sh
#!/bin/bash
A zone transfer uses the Transmission Control Protocol (TCP) for transport, and
takes the form of a client–server transaction. The client requesting a zone
transfer may be a slave server or secondary server, requesting data from a master
server, sometimes called a primary server. The portion of the database that is
replicated is a zone.
The data contained in a DNS zone may be sensitive from an operational security
aspect. This is because information such as server hostnames may become public
knowledge, which can be used to discover information about an organization and even
provide a larger attack surface.
axfr.sh
#!/bin/bash
# Simple Zone Transfer Bash Script
# $1 is the first argument given after the bash Script
# Check if argument was given, if not, print usage
if [ -z "$1" ]; then
echo "[*] Simple Zone transfer script"
echo "[*] Usage : $0 <domain name> "
exit 0
fi
# If argument was given, identify the DNS servers for the domain.
# For each of these servers, attempt a zone transfer
SYN Scanning
Involves sending SYN packets without sending FIN
Often bypasses firewalls
no longer that effective
UDP Scanning
stateless
For UDP ports, use -u with netcat nc -unvv -w 1 -z $IP $PORT_RANGE
Traffic Accountability
iptables-counters.sh
#!/bin/bash
Specify a port
nbtscan
nbtscan $IP_RANGE
#!/usr/bin/python
import socket
import sys
if len(sys.argv) != 2:
print "Usage: vrfy.py <username>"
sys.exit(0)
-U scans UDP
onesixtyone
SNMPWalk
need community string
snmpwalk -c public -v1 $IP