• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2015
  • May
  • 31
  • Penetration Testing Procedures

Penetration Testing Procedures

May 31, 2015November 18, 2017 Comments Off on Penetration Testing Procedures

Penetration testing (otherwise known as pentesting, or the more general security testing) is the process of testing your applications for vulnerabilities, and answering a simple question: “What could a hacker do to harm my application, or organization, out in the real world?”.



An effective penetration test will usually involve a skilled hacker, or team of hackers. You purposefully ensure that the hacker(s) don’t have access to any source code, and ask them to try to gain access to your systems. Penetration tests can be carried out on IP address ranges, individual applications, or even as little information as a company name. The level of access you give an attacker depends on what you are trying to test.

To give a few examples of penetration tests you could run:

  1. You could give a team of penetration testers a company’s office address, and tell them to try and gain access to their systems. The team could employ a huge range of differing techniques to try and break into the organization, ranging from social engineering (e.g. asking a receptionist if they can take a look in a computer room to run safety checks, and installing USB keyloggers) through to complex application specific attacks.
  2. A penetration tester could be given access to a version of a web application you haven’t deployed yet, and told to try and gain access or cause damage by any means possible. The penetration tester will then employ a variety of different attacks against various parts of the application in an attempt to break in.

One thing which is common amongst all penetration tests, is that they should ALWAYS have findings. There is no perfect system, and all organizations can take additional steps to improve their security. The purpose of a penetration test is to identify key weaknesses in your systems and applications, to determine how to best allocate resource to improve the security of your application, or organization as a whole.

 

Here’s a general outlook on a Penetration testing methodology and the tools they use in real-world scenarios.

 

Part 1 : Information gathering

This step occurs BEFORE you even get into their network. Here you are trying to gather as much information as possible about the business, their websites, personnel, EVERYTHING.

Tools they use:

  • Facebook/Twitter/LinkedIn/Google+
  • Maltego
  • Creepy
  • Social Engineering (Who do I talk to, to apply for an IT job?)
  • Recon-ng
  • TheHarvester
  • Metagoofil
  • Shodan + Shodan’s API
  • DNSenum/DNSrecon

 

Part 2: Network Discovery

Here you scan the network and map out every possible device, system, domain controller, host, and piece of equipment. This is also where they use wireshark or TCPDump and start capturing to see what’s going on in the network. If there are 2 devices communicating, you want to know about it.

Tools they use:

  • NMap
  • Unicorn Scan
  • Maltego
  • NetDiscover
  • SMBClient
  • Ettercap
  • Wirehark
  • TCPDump
  • Arping
  • Hping3
  • Xprobe2
  • TCPflow

 

Part 3: Enumeration

Here is where you perform port mapping, service and version checks, OS detection, service scans, domain enumeration, user enumeration locally and any amount of information that you can get a hold of.

Tools they use:

  • NMap
  • NSE (Nmap Scripting Engine)
  • Maltego
  • SCAPY
  • NBTscan (NetBios shit)
  • Cisco Analysis Tools
  • Wireshark
  • DNSEnum
  • smtp-user-enum
  • snmpwalk

 

Part 4: Vulnerability Assessment

Here is where you take the services, devices software, information you got from the enumeration part of the assessment, and we scan it for vulnerabilities.

Tools they use:

  • NMap
  • NSE (Nmap Scripting Engine)
  • Metasploit/Armitage + Nexpose
  • Nessus
  • OpenVAS
  • Powerfuzzer
  • Custom Fuzzers
  • Cisco Analysis Tools (Nipper is a great one)

 

Part 5: Exploitation and Security

Here you confirm that the systems are vulnerable to attacks and exploits you have found during the scanning and vulnerability assessment. If you are at that level, you can write your own tools, but I’m still only in the beginning stages on that front. This is also where I suggest security updates, software updates and add security configurations for routers, switches, and firewalls.

Tools they use:

  • NSE (Nmap Scripting Engine)
  • Metasploit/Armitage + Nexpose
  • Wireshark + SCAPY
  • Various Servers (Bind9 DNS servers, DHCP servers, SMB Servers, Radius servers, etc…)
  • Yersina
  • Hexinject
  • Tcpreplay
  • Pineapple (For wireless Pentests)

 

Part 6: Post Exploitation

Here is where you install some sort of backdoor that you can access in case the host disconnects or the connection is lost.

Tools they use:

  • Stunnel
  • SBD (Secure Back Door) ~ Linux
  • Cryptcat
  • Meterpreter Persistence
  • Powersploit
  • Iodine
  • UDPTunnel

 

Conclusion

Organizations need to conduct regular testing of their systems for the following key reasons:

  • To determine the weakness in the infrastructure (hardware), application (software) and people in order to develop controls
  • To ensure controls have been implemented and are effective – this provides assurance to information security and senior management
  • To test applications that are often the avenues of attack (Applications are built by people who can make mistakes despite best practices in software development)
  • To discover new bugs in existing software (patches and updates can fix existing vulnerabilities, but they can also introduce new vulnerabilities).

 

Post navigation

6 Ways to Secure a Wireless Wi-Fi Network
How to detect SQL Injection attacks

Related Articles

RedCloud – Powerful Red Team Infrastructure deployment using Docker

- Pentesting
October 31, 2019

WindowsSpyBlocker – Block spying and tracking on Windows

- Firewall, Pentesting
May 5, 2019July 27, 2019

Android Application Penetration Testing Checklist

- Pentesting
May 1, 2019
hacker gadgets
hacker phone covers

Recent Posts

CVE-2023-28326: Critical Vulnerability in Apache OpenMeetings

CVE-2023-28326: Critical Vulnerability in Apache OpenMeetings

March 28, 2023
Decider - A Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework

Decider – A Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework

March 28, 2023
Android app from China exploited 0-day CVE-2023-20963 flaw

Android app from China exploited 0-day CVE-2023-20963 flaw

March 28, 2023
Geogramint: OSINT Geolocalization tool for Telegram

Geogramint: OSINT Geolocalization tool for Telegram

March 28, 2023
Polaris: open source policy engine for Kubernetes

Polaris: open source policy engine for Kubernetes

March 27, 2023
ThunderCloud - Cloud Exploit Framework

ThunderCloud – Cloud Exploit Framework

March 27, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW