Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
oh and also i got the wordpress hosting on that website so i also run the WPscan on them. and don't find anythting interestinf (for me atleast)
2erXre5226064doh interesting task, that kind of work is very satisfying 😀
try sql injection on the page
portscan for os fingerprinting
webserver scan for webserver fingerprinting
try out nessus vulnerability scanner
get hands on with metasploit
and and and
2erXre5226064dthink like an attacker: where are interfaces, how are they exposed, how are they protected, is there input validation...
I can't provide any precise information regarding how to do the pentest without the ability to recreate the target here or having explicit permission from the owner to conduct a pentest directly on their system. In both cases I'd have to do it for you which.. meh, I don't really feel like doing and it'd be cheating. The problem is that pentesting is a skill, a science, an art of its own. The only thing that all targets have in common is that you'll want to extract as much information as you can (reconnaissance) and based on that try to recreate the system locally to see what works and what doesn't. When you have a working attack, that's when you can fire shots on your target.
Footprinting, not sure what you mean by that.. determining attack surface? OS fingerprinting (use p0f for that)? Scanning means port scanning and identifying services. You can use nmap for seeing what ports are open, but I tend to prefer ncat so that I can program in and randomize sleep timers between probing of each port to avoid tripping an IDS, and to select only the ports that I'm interested in (80, 443, 25, 993, etc etc). From there on out I like to use telnet to communicate with servers. You'll have to have a good understanding of the protocols that the servers speak because in telnet you'll be speaking it too. Enumeration, probably also part of the reconnaissance process. Information gathering, as much as you can. Gaining access, that's the actual exploitation. Try to upload a shell or in any way exploit one of their services to gain a shell under its user. This can be done by injecting certain data to the web server in case of the Apache Struts vulnerability for example (jexboss is a good tool for exploiting that). For different servers there's different vulnerabilities. Once you know the service and its version, you can look it up in the Exploit-DB. Once you've got shell access, you can try to use a kernel exploit to root the server.
@Condor no i don't ask you to do my work. i just need the explaination which you did VERY GOOD (i wish i could ++ 11 times). i was very lost i don't understand a thing; which is which, what is this, and why is that? and so on and so forth. since this is the first meeting and he only gave subject syllabus
so apparently i found this server don't Cipher its SSL (i don't understand actually, but the terminal said so). and i can access telnet via port 22 and it stop doing anything after:
Escape Character ^]
as soon as i enter something it said Wrong Protocol-- or something like that, im in bed now -- and then disconnect.
my target was to connect to the server via SSH which the mentor said it possible. as soon as i got there i can figure out my exploits. but now i am running around in circles in reconnaissance and enumerating.
@wowotek ooh, SSH? If you've got the keys to login to the server, just do it that way. Otherwise you'll be looking to bruteforce your way in, which is difficult. Servers on the internet get their sshd bruteforced all the time, but with little success. And when the server doesn't accept passwords (which the server notifies you of but the many hekorman who probe these servers on the internet don't know how to use apparently 🙃), it's impossible. So yeah.. ideally you'd have keys. Then you can login and go ahead with the rooting process, or maybe the keys are already authorized to login as root to begin with. Not sure how that'd be a pentest though 🤔 I mean SSH is something that's used all the time by sysadmins to login to their remote servers... There's no hackery involved in that 🤨
@Condor it's actually hidden in the first place since the port are missing and it's routed from subdomain. so that (maybe) what mentor said it's possible; i forgot to mention that this server are built for pentest training and assignments. so they said it is easy, but i still don't get where is the easy part -_-. i am no tester just plain developer want to riddle around in networking, but when i do the recon and enum i know there are a lot of security holes there. but i don't know how to exploit them.
are the telnet thing are crucial? can i exploit that?
@wowotek telnet is mostly what I'd use for determining what server is running there. Every server speaks their protocols ever so slightly differently. Many servers do introduce themselves in telnet just by saying what they are though. For example, my mail server here is Postfix. Normally it'd also say that it's running on Ubuntu but I've told the server to omit that during its setup.
The server machine being routed doesn't really matter as long as you can reach it. If it's something that's built for pentesting, maybe it's running Metasploitable? That's a distribution that's designed to be vulnerable.
Condor2905863d@wowotek Try logging into the server via ssh. Also check what other ports are open and if they're exploitable.. and if it's Metasploitable, just look for something generic that can exploit something in that distribution and that way you may be able to wing it. Anyway, OpenSSH 7.4 is pretty generic, most distributions have that. Look for more info that can uniquely identify this one. And for every service that you find the version for, look it up in the Exploit-DB. And be sure to also ask the teacher for more help if you need it. For me it's been a while since I've done this sort of thing.. so yeah.
xzvf902363dI can't tell you much without more information, but a good start is to run nikto.
Find out what tech stack they're running and look at CEVs for them.
xzvf902362d@wowotek I'm a noob myself in web exploitation, but the same steps apply as in other types of hacking(like binary exploitation):
1) Reconnaissance; What does it do? What does it use? How? What can I input?(here you can shortcut to things like SQLI; xss tesring)
2) Finding potential vulnerabilities; from the information gathered, look at fitting CVEs(these are vulnerabilities that were reported and are public)
3) Understanding those potential vulnerabilities; This step often falls short. What happens? Why? How can I adapt this to my use case?
4) Writing and testing the exploit;
5) Did it work? If not, repeat from step 2
6) Done everything from step 2 with no success? Go back to step 1.
7) Still nothing? Good luck. Mess around with stuff further.
These are the basic steps.
For tooling, look at nikto(basic website vulnerability scanner)
Metasploit(a library of a shitton of exploits, which saves you a lot of time not having to write them.).
Your Job Suck?
Take a quick quiz from Triplebyte to skip the job search hassles and jump to final interviews at hot tech firms
Get a Better Job