Giter VIP home page Giter VIP logo

pentest-methodology's Introduction

Penetration Testing Methodology

Penetration testing Process, Methods and Real world Attacks Collections

Framework and Testing Guide

  • OWASP - Open Web Applicaiton Security Project
  • PTES- Penetration Testing Execution Standard
  • PCI DSS PCI Penetration Testing Guide
  • PTF - Penetration Testing Framework
  • OSSTMM - Open Source Security Testing Methodology Manual

Pre Engagement

VMware

  • vmplayer
  • vmware workstation
  • vmware esxi

Windows

  • windows 7/8/10

Linux

  • kali
  • Debian
  • ubuntu
  • Arch
  • Gentoo

Wifi Adapter

Spectrum Analyser

Open Source Software

  • Maltego - Maltego is an interactive data mining tool that renders directed graphs for link analysis.
  • Metasploit Framework - collection of remote exploits and post exploitation tools for all platforms
  • SET toolkit - designed to perform advanced attacks against the human element.
  • theHarvester - gathering e-mail accounts, user names and hostnames/subdomains from different public sources
  • mimikat - extract plain or hash of password.
  • dig - bind-utils
  • THC Hydra - for brute force
  • Powersploit - a collection of Microsoft PowerShell modules
  • CrackmapExec - post exploitation tools for Active Directory.
  • Burpsuite - can use as proxy as well as active scanner
  • Empire - powershell framework for remote and post exploitation.
  • Nmap - port scanner
  • knockpy - subdomain scanner
  • netcat - network utility
  • nishang - post exploitation powershell Framework

Checklist

  • Determination of the type of pentest (Blackbox, Whitebox)
  • Key objectives behind this penetration test
  • Location address and contact (if it is an onsite job)
  • Validation that the Authorization Letter has been signed
  • URL of the web application that is in scope and validation that isaccessible
  • 2 sets of credentials (normal and admin or a privilege user) and validation that are working
  • Determination of the environment (Production or UAT)
  • Number of static and dynamic pages
  • Testing Boundaries (DoS, Brute force attacks etc.)
  • Technologies (PHP, ASP, .NET, IIS, Apache, Operating system etc.)
  • Any VPN or port numbers are needed and verify those ahead of time
  • Any web services that the site may use.
  • Any pages that the client does not want to be tested.
  • Any pages that submit emails
  • IP address of the tester
  • Escalation contact
  • 3rd parties that needs to be contacted in advance of the pentest
  • Web application firewalls and other IDS in place
  • Timeframe of the assessment (dates and hours)
  • Diagrams and any kind of documentation
  • Validation that a backup has been performed recently on theapplication
  • Other client requirements

Intelligence Gathering

Guides

Tools

Thread Modelling

Guides

Tools

Vulnerability Analysis

Automatic Vul scanners

  • Accunetix
  • OpenVas
  • Vega
  • Nikto
  • Wikto
  • w3af
  • Xenotix XSS Framework
  • Wapiti

Manual Scanner

  • nmap
  • Metaploit Framework

Guides

Initial Intrusion

Pubic exploit POCS and payloads techniques

Web Application

Attacker Vector

Public POCS

Reverse Connection

Wifi

Post Exploitation

Windows

Password dumping

AD

Privilege Escalation

Lateral Movement

Bypass techniques

MISC

Linux

Privilege Escalation

LDAP

Lateral Movement

Web Shell

Data Exfil

Reporting

All the Tools mentioned here are Open Source or free.

pentest-methodology's People

Contributors

kyawthiha7 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.