Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CDC Day 1: Network Vulnerability Scanning
- ########################
- # Scanning Methodology #
- ########################
- - Ping Sweep
- What's alive?
- ------------
- sudo nmap -sP 157.166.226.*
- strategicsec
- -if -SP yields no results try:
- sudo nmap -sL 157.166.226.*
- strategicsec
- -Look for hostnames:
- sudo nmap -sL 157.166.226.* | grep com
- strategicsec
- - Port Scan
- What's where?
- ------------
- sudo nmap -sS 162.243.126.247
- strategicsec
- - Bannergrab/Version Query
- What versions of software are running
- -------------------------------------
- sudo nmap -sV 162.243.126.247
- strategicsec
- - Vulnerability Research
- Lookup the banner versions for public exploits
- ----------------------------------------------
- http://exploit-db.com
- http://securityfocus.com/bid
- https://packetstormsecurity.com/files/tags/exploit/
- ##########################
- # Introduction to Nessus #
- ##########################
- https://34.209.124.21:8834
- username: userX (user1, user2, user3, user4, user5 and so on...)
- password: Passw0rd!
- Target Hosts
- ------------
- 172.31.6.2
- 172.31.6.157
- 172.31.6.1
- 172.31.6.138
- 172.31.6.54
- ##############
- # AWS Basics #
- ##############
- https://910199321440.signin.aws.amazon.com/console
- Peter_CDC
- Arivey_CDC
- Miguel_CDC
- Mark_CDCF
- Bill_CDC
- Terry_CDC
- Naiwang_CDC
- Matt_CDC
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement