Skip to content

mochsalim/pentest-methodology

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

60 Commits
 
 
 
 
 
 

Repository files navigation

Penetration Testing Methodology

Penetration testing Process, Methods and Real world Attacks Collections

Framework and Testing Guide

  • OWASP - Open Web Applicaiton Security Project
  • PTES- Penetration Testing Execution Standard
  • PCI DSS PCI Penetration Testing Guide
  • PTF - Penetration Testing Framework
  • OSSTMM - Open Source Security Testing Methodology Manual

Pre Engagement

VMware

  • vmplayer
  • vmware workstation
  • vmware esxi

Windows

  • windows 7/8/10

Linux

  • kali
  • Debian
  • ubuntu
  • Arch
  • Gentoo

Wifi Adapter

Spectrum Analyser

Open Source Software

  • Maltego - Maltego is an interactive data mining tool that renders directed graphs for link analysis.
  • Metasploit Framework - collection of remote exploits and post exploitation tools for all platforms
  • SET toolkit - designed to perform advanced attacks against the human element.
  • theHarvester - gathering e-mail accounts, user names and hostnames/subdomains from different public sources
  • mimikat - extract plain or hash of password.
  • dig - bind-utils
  • THC Hydra - for brute force
  • Powersploit - a collection of Microsoft PowerShell modules
  • CrackmapExec - post exploitation tools for Active Directory.
  • Burpsuite - can use as proxy as well as active scanner
  • Empire - powershell framework for remote and post exploitation.
  • Nmap - port scanner
  • knockpy - subdomain scanner
  • netcat - network utility
  • nishang - post exploitation powershell Framework

Checklist

  • Determination of the type of pentest (Blackbox, Whitebox)
  • Key objectives behind this penetration test
  • Location address and contact (if it is an onsite job)
  • Validation that the Authorization Letter has been signed
  • URL of the web application that is in scope and validation that isaccessible
  • 2 sets of credentials (normal and admin or a privilege user) and validation that are working
  • Determination of the environment (Production or UAT)
  • Number of static and dynamic pages
  • Testing Boundaries (DoS, Brute force attacks etc.)
  • Technologies (PHP, ASP, .NET, IIS, Apache, Operating system etc.)
  • Any VPN or port numbers are needed and verify those ahead of time
  • Any web services that the site may use.
  • Any pages that the client does not want to be tested.
  • Any pages that submit emails
  • IP address of the tester
  • Escalation contact
  • 3rd parties that needs to be contacted in advance of the pentest
  • Web application firewalls and other IDS in place
  • Timeframe of the assessment (dates and hours)
  • Diagrams and any kind of documentation
  • Validation that a backup has been performed recently on theapplication
  • Other client requirements

Intelligence Gathering

Guides

Tools

Thread Modelling

Guides

Tools

Vulnerability Analysis

Automatic Vul scanners

  • Accunetix
  • OpenVas
  • Vega
  • Nikto
  • Wikto
  • w3af
  • Xenotix XSS Framework
  • Wapiti

Manual Scanner

  • nmap
  • Metaploit Framework

Guides

Initial Intrusion

Pubic exploit POCS and payloads techniques

Web Application

Attacker Vector

Public POCS

Reverse Connection

Wifi

Post Exploitation

Windows

Password dumping

AD

Privilege Escalation

Lateral Movement

Bypass techniques

MISC

Linux

Privilege Escalation

LDAP

Lateral Movement

Web Shell

Data Exfil

Reporting

All the Tools mentioned here are Open Source or free.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published