• Penetration Test


    Pen Testing Toobox

    RECONNAISSANCE
    • For reconnaissance, use:
      • Nmap
      • Whois
      • Nslooup
      • Theharvester
      • Shodan
      • Recon-NG
      • Censys
      • Aircrack-NG
      • Kismet
      • WiFite
      • SET
      • Wireshark
      • Hping
      • Metasploit framework
    ENUMERATION
    • To list targets, use:
      • Nmap
      • Nslooup
      • Wireshark
      • Hping
    VULNERABILITY SCANNING
    • To scan for vulnerabilities, use:
      • Nmap
      • Nikto
      • OpenVAS
      • SQLmap
      • Nessus
      • W3AF
      • OWASP ZAP
      • Metasploit framework
    CREDENTIAL ATTACKS
    • For offline password cracking, use:
      • Hashcat
      • John the Riipper
      • Cain and Abel
      • Mimikatz
      • Aircrack-NG
    • For brute-forcing services, use:
      • SQLmap
      • Medusa
      • Hydra
      • Cain and Abel
      • Mimikatz
      • Patator
      • W3AF
      • Aircark-NG
    Persistence
    • Once you have expoited a target, use these to make sure you can get back in:
      • SET
      • BeEF
      • SSH
      • NCAT
      • NETCAT
      • Drozer
      • Powersploit
      • Empire
      • Metasploit framework
    Configuration Compliance
    • To evaluate a configuration to determine if it's copliant with a stantdard or regulation, use:
      • Nmap
      • Nikto
      • OpenVAS
      • SQLmap
      • Nessus
    Evasion
    • To evade detection, use:
      • SET
      • Proxychains
      • Metaspoit framework
    Decompilation
    • To decompile executables, use:
      • Immunity debugger
      • APKX
      • APK studio
    Penetration Testing Use Cases
    • Forensics
      • To carry out digital forensics, use:
        • Immunity debugger
      • Debugging
        • To debug code, use:
          • OLLYDBG
          • Immunity debugger
          • GDB
          • WinDBG
          • IDA
    Software Assurance
    • For general software assurance, use:
      • Findsecbugs
      • SonarQube
      • YASCA
    • For fuzzing, use:
      • Peach
      • AFL
    SAST(Static Application Security Testing)
    DAST(Dynamic Application Security Testing)
    QUICK REVIEW
    • Know what each of the tools listed in the objectives are commonly used for
    • Some tools, such as nmap, can fit into multiple use cases
    • It's more important to understand the purpose of a tool than to memorize categories
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    HTML5的页面资源预加载技术(Link prefetch)加速页面加载
    正则表达式入门教程
    SQL 查询分析器操作(修改、添加、删除)表及字段等
    linux终端相关概念解释及描述
    linux系统编程--守护进程,会话,进程组,终端
    linux系统编程--信号
    linux系统编程--进程间通信
    linux系统编程--进程
    Python GUI编程(Tkinter)(一)
    C++中时间转换
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13933799.html
Copyright © 2020-2023  润新知