Step 1. Installing Additional Tools

  • Figlet ( figlet company name)
  • Scrub
  • bum
  • apt-file OR dpkg -s
  • bleachbit

Step 2. Pentesting Checklist

Pentesting Workflow
  1. Gather information about the client organization
    • Foundation
    • Objectives of the Company
    • Products
    • Employee Information
    • Business Partners
    • Clients
  2. Client Organization Premises
    • Network Equipments
    • Server Room

Information Gathering

Information Gathering

  • dnsstuff.com

metgoofil -d kali.org -t pdf -o temp -f kali.html

External Tesing

External Network Penetration Testing

Web Penetration Testing

  • web application firewall scan
wafw00f http://ocoretech.com
  • Load Balancer Scan
wafw00f http://ocoretech.com
  • Website crawling
burp suite
dirb
gobuster
  • Website Cloning / Copy
Social Engineering Toolkit (SET)
httrack
httrack <url> -O <output_path>
  • SSL Scan
sslscan <url>
  • CMS Application Scan
    wordpress / drupal or joomla
wpscan -u <url>
wpscan -u <url> --enumerate vp
wpscan -u <url> --enumerate users
  • Vulnerabilities Scanner
burpsuite
openvas
  • Exploiting SQL injection
sqlmap
  • Maintaining Access Web Shell
Weevely (https://github.com/epinna/weevely3)
  • Denial of Service attack
Low Orbit Ion Cannon

Internal Pentesting Workflow

  • Detectin MITM (man-in-the-middle)
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 -t <victim_ip> <gateway_ip>
arpspoof -i eth0 -t <victim_ip> <gateway_ip>
in wireshark
arp.duplicate-address-frame

References:

  1. DNSAdmin to DC compromise-shay Ber
  2. Stageless Meterpreter Payloads
  3. DNSAdmin to Domain Controller Compilation
  4. ired team-dnsadmin to domain compromise