Penetration Testing mailing list archives
Re: Pen Test Main Map updated - source .mm now available
From: Marco Ivaldi <raptor () 0xdeadbeef info>
Date: Tue, 11 Jul 2006 12:07:57 +0200 (CEST)
On Mon, 10 Jul 2006, Toggmeister () vulnerabilityassessment co uk wrote:
Hi,
Toggmeister,
After all your positive emails and responses I've made a number of tweaks with my map and added extra content: http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
Just a few random comments (definitely not meant to be exhaustive) about your map: 1) FTP (21/tcp): - ftp bounce attack (see nmap(1)) 2) SSH (22/tcp): - user enumeration through OpenSSH/PAM (CVE-2003-0190) 3) TELNET (23/tcp): - user enumeration through misconfigured Cisco IOS (as implemented in my old bruteforcer http://www.0xdeadbeef.info/code/brutus.pl) 4) SMTP (25/tcp): - user enumeration through "RCPT TO" command (brutus.pl implements this feature as well), most Sendmail configurations are affected - fingerprint the MTA using smtpscan 5) FINGER (79/tcp): - finger @hostname - finger "1234567890"@hostname (specially useful with Solaris;) - finger for common names/words (GECOS field in /etc/passwd) - finger for other "special" strings 6) SNMP (161/udp) - try SNMP spoofing 7) NETBIOS-SSN (139/tcp), MICROSOFT-DS (445/tcp): - use samba-tng's rpcclient (null session, user enumeration, etc.) 8) PROXY (8080/tcp, 3128/tcp, etc.) - test for CONNECT method - tunneling, etc. [...] Of course, for every service you should check for specific vulnerabilities leading to information disclosure, remote access, privilege escalation, potential DoS (as defined in your testing scope), and so on... Moreover, a lot of other checks are usually needed, specially for "complex" services like HTTP/HTTPS/NETBIOS/etc.: not all of them are performed by automated scanners or exploitation frameworks. But i suppose you already know that;) There are plenty of interesting methodologies/checklists outta here which may turn out to be useful to improve your map -- nice work anyway! Cheers, -- Marco Ivaldi Antifork Research, Inc. http://0xdeadbeef.info/ 3B05 C9C5 A2DE C3D7 4233 0394 EF85 2008 DBFD B707 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Pen Test Main Map updated - source .mm now available Toggmeister (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available brad Causey (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available Ralph Forsythe (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available Pieter Baele (Jul 11)
- Re: Pen Test Main Map updated - source .mm now available Brad Causey (Jul 11)
- Re: Pen Test Main Map updated - source .mm now available Joseph Nicosia (Jul 11)
- Re: Pen Test Main Map updated - source .mm now available Ralph Forsythe (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available brad Causey (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available Ralph Forsythe (Jul 10)
- Re: Pen Test Main Map updated - source .mm now available Mario Platt (Jul 11)
- <Possible follow-ups>
- Re: Pen Test Main Map updated - source .mm now available Marco Ivaldi (Jul 11)