information security/daliy

Penetration Testing Framework 0.4

Double B 2009. 3. 31. 09:12
> > > > > > > > > > > > > >
hide
hide
hidefull-1
hidefull-5
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hidewizard
hide
hidefull-1
hide
hidexmag
hide
hide
leafattach

*AUDLVL System auditing : System auditing events logged and may be audited

*OBJAUD Object auditing : Object auditing activity defined logged and may be audited

*AUTFAIL Authorized failure: All access failure,Incorrect Password or User ID logged and may be audited

*PGMFAIL System integrity violation : Blocked instructions,Validation failure,Domain violation logged and may be audited

*JOBDTA Job tasks : Job start and stop data(disconnect,prestart) logged and may be audited

*NETCMN Communication & Networking tasks : Action that occur for APPN filtering support logged and may be audited

*SAVRST Object restore: Restore(PGM,JOBD,Authority,CMD,System State) logged and may be audited

*SECURITY Security tasks: All security related functions(CRT/CHG/DLT/RST) logged and may be audited

*SERVICE Services HW/SW: Actions for performing HW or SW services logged and may be audited

*SYSMGT System management: Registration,Network,DRDA,SysReplay,Operational not logged and cannot be audited

*CREATE Object creation: Newly created objects, Replace exisitng objects logged and may be audited

*DELETE Object deletion: All deletion of external objects logged and may be audited

*OFCSRV Office tasks: Office tasks(system distribution directory,Mail) logged and may be audited

*OPTICAL Optical tasks: Optical tasks(add/remove optical cartridge,Autho) logged and may be audited

*PGMADP Program authority adoption: Program adopted authority, gain access to an object logged and may be audited

*OBJMGT Object management: Object management logged and may be audited

*SPLFDTA Spool management: Spool management logged and may be audited

hide
leafattach

All-Object Authority (*ALLOBJ) : This is the most powerful authority on any AS400 system. This authority grants the user complete access to everything on the system. A user with All-Object Authority cannot be controlled.

Service Authority (*SERVICE) : Service Authority provides the user with the ability to change system hardware and disk configurations, to sniff network traffic and to put programs into debug mode (troubleshooting mode) and see their internal workings. The system services tools include the ability to trace systems functions and to patch and alter user made and IBM delivered programs on disk

manipulate data on disk.

Save and Restore Authority (*SAVSYS) : This authority allows the user to backup and restore objects. The user need not have authority to those objects. The risk with SAVSYS Authority is that a user with this authority can save all objects (including the most sensitive files) to disk (save file), delete any object (with the Free Storage option), restore the file to an alternate library, and then view and alter the information. Should the user alter the information, they would have the ability to replace the production object with

their saved version.

System Configuration Authority (*IOSYSCFG) : System communication configuration authority can also be used to set up nearly invisible access from the outside as a security officer -- without needing a password. System Configuration Authority provides the ability to configure and change communication configurations (e.g. lines, controllers, devices), including the system's TCP/IP and Internet connection information.

Spool Control Authority (*SPLCTL) : Spool Control authority gives the user read and modify all spooled objects (reports, job queue entries, etc.) on your system. The user may hold, release and clear job and output queues, even if they are not authorized to those queues.

Security Administrator Authority (*SECADM) : Security Administrator grants the authority to create, change and delete user ID?s. This authority should be reserved to essential administration personnel only.

Job Control Authority (*JOBCTL) : Job Control Authority can be used to power down the system or to terminate subsystems or individual jobs at any time, even during critical operational periods. Job Control Authority provides the capability to control other user?s jobs as well as their spooled files and printers.

Audit Authority (*AUDIT) : Audit Authority puts a user in control of the system auditing functions. Such a user can manipulate the system values that control auditing and control user and object auditing. These users could also turn off auditing for sensitive objects in an effort to obscure certain actions

hide
hidefull-1
hide
hidefull-2
hidefull-2
hidefull-3
hide
hidefull-4
hide
hidefull-5
hide
Configuration Files.
The relevant configuration files that control a Cisco router have already been covered in Methodology | (5) Further your attack.

In the child to this entry is a sample running-config file from a Cisco 2600 router running IOS version 12.2.

Enable password.
The Holy Grail, the 'enable' password, the root level access to the router. There are two main methods of storing the enable password in a config file, type 5 and type 7, MD5 hashed and Viginere encryption respectively.
enable secret 5 $1$c2He$GWSkN1va8NJd2icna9TDA.

Type 7 should be avoided as it is extremely easy to crack, it can even be done by hand! They can be cracked with tools like "Cain & Abel" (www.oxid.it) and Boson's GetPass (bosondownload.com/utils/bos_getpass.exe). Even online at www.ibeast.com/content/tools/CiscoPassword/index.asp

An example Type 7 password is given below but does not exist in the example running-config file:
enable password 7 104B0718071B17

Type 5 password protection is much more secure. However, should an attacker get hold of the configuration file somehow, then the MD5 hash can be extracted and cracked offline with tools like "Cain & Abel". If you want to use "John The Ripper", then the hash should be extracted and entered into a text file as follows:
username:$1$c2He$GWSkN1va8NJd2icna9TDA.

The line that reads "enable password router", where "router" is the password, is the TTY console password which is superceeded by the enable secret password for remote access.




SNMP Settings.
If the target router is configured to use SNMP, then the SNMP community strings will be in the config file. It should have the read-only (RO) and may have the read-write (RW) strings.
snmp-server community Cisco RO
snmp-server community enable RW



Telnet Access.
If telnet is configured on the VTY (Virtual TTY) interface, then the credentials will be in the config file:
line vty 0 4
password telnet
login
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
김재벌(ostoneo)
덧글 1개 | 조회수 149


레이어 닫기

작성하신 글은 아래의 서비스로 보내신 글입니다.
해당 서비스에서도 삭제 반영 됩니다.
(비디오반영은 추후 제공됩니다.)

* 글보내기 정보는 아래와 같습니다.

취소
Penetration Testing Framework 0.4 | 해킹/보안 통합게시판
2007.06.15 22:09

Penetration Testing Framework 0.4

Author: Toggmeister (a.k.a Kev Orrey) & Lee Lawson


Changes:

  • Wireless Pen Testing section including toolkit, CVE references, white papers etc. extensive input from Matt Byrne at WirelessDefence.org

  • AS/400 section including toolkit, CVE references etc. courtesy of Nabil OUCHN, Security-Database.com co-founder

  • VoIP Section including toolkit, CVE references, white papers etc. (Kev)

  • BlueTooth Section including toolkit, CVE references, white papers etc. (Kev)

  • Cisco Section including toolkit, CVE references, white papers etc. (Lee)

  • Numerous Changes throughout.

  • Broken URL's fixed.


Penetration Testing FrameworkPre-Inspection Visit - templateNetwork Footprinting (Reconnaissance) Th ...Whois is widely used for querying author ...Authoritive BodiesIANA - Internet Assigned Numbers Authori ...ICANN - Internet Corporation for Assigne ...NRO - Number Resource OrganisationRIR - Regional Internet Registry AFRINIC - African Network Information Ce ...APNIC - Asia Pacific Network Information ...National Internet RegistryAPJIICNNICJPNICKRNICTWNICVNNICARIN - American Registry for Internet Nu ...LACNIC - Latin America & Caribbean Netwo ...RIPE - Reseaux IP Européens—Network Coor ...WebsitesDNS StuffOnline DNS one-stop shop, with the abili ...Fixed OrbitAutonomous System lookups and other onli ...GeektoolsKartooMetasearch engine that visually presents ...NetcraftOnline search tool allowing queries for  ...RobtexExcellent website allowing DNS and AS lo ...Traceroute.orgWebsite listing a large number links to  ...Wayback MachineStores older versions of websites, makin ...Whois.netToolsIP2LocationSam SpadeCheops-ngShazouDomain Research ToolFirefox AS Number PluginCountry whoisSmart whoisInternet SearchGeneral InformationWeb InvestigatorTracesmartFriends ReunitedEbay - profiles etc.FinancialEDGAR - Company information, including r ...Google Finance - General Finance PortalHoovers - Business Intelligence, Insight ...Companies House UKLand Registry UKPhone book/ Electoral Role Information411 - Online White Pages and Yellow Page ...Abika - Background Check, Phone Number L ...Zabasearch - People Search Engine. US192.com - Electoral Role Search. UKBT.com. UKResidentialBusinessCode SearchGoogle Hacking DatabaseGeneric Web SearchingLinked To(See also Kartoo)Linked From(See also Kartoo)Forum EntriesEmail AddressesContact DetailsGHDB ResultsNewsgroups/forumsBack end files.exe / .txt / .doc / .ppt / .pdf / .vbs  ...DNS Record Retrieval from publically ava ...Types of Information RecordsSOA Records - Indicates the server that  ...MX Records - List of a host’s or domain’ ...NS Records - List of a host’s or domain’ ...A Records - An address record that allow ...PTR Records - Lists a host’s domain name ...SRV Records - Service location record.HINFO Records - Host information record  ...TXT Records - Generic text record.CNAME - A host’s canonical name allows a ...RP - Responsible person for the domain.Database SettingsVersion.bindSerialRefreshRetryExpiryMinimumSub DomainsInternal IP rangesReverse DNS for IP RangeZone TransferSocial EngineeringRemotePhoneScenariosIT Department.
"Hi, it's Zoe from the he ...ResultsContact DetailsNamePhone numberEmailRoom numberDepartmentRoleEmailScenariosHi there, I am currently carrying out an ...Good Morning,

The IT Department had a c ...SoftwareResultsContact DetailsNamePhone numberEmailRoom numberDepartmentRoleOtherLocalPersonasNameSuggest same 1st name.PhoneGive work mobile, but remember they have ...EmailHave a suitable email addressBusiness CardsGet cards printedContact DetailsNamePhone numberEmailRoom numberDepartmentRoleScenariosNew IT employeeNew IT employee.
"Hi, I'm the new guy in ...Fire InspectorTurning up on the premise of a snap fire ...ResultsMapsSatalitte ImageryBuilding layoutsOtherDumpster DivingWeb Site copyhtttrackteleport proBlack WidowDiscovery & Probing. Enumeration can ser ...Default Port ListsWindows*nixEnumeration tools and techniques - The v ...General Enumeration Toolsnmapnmap -n -A -P0 -p- -T Agressive -iL nmap ...nmap -sU -P0 -v -O -p 1-30000 -T polite  ...nmap -sV -P0 -v -p 21,22,23,25,53,80,443 ...grep "appears to be up" nmap_saved_filen ...netcatnc -v -w 2 -z IP_Address port_range/port ...nc -v -n IP_Address portamapamap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] - ...amap -bqv 192.168.1.1 80xprobe2xprobe2 192.168.1.1sinfp./sinfp.pl -i  -pnbtscannbtscan [-v] [-d] [-e] [-l] [-t timeout] ...hpinghping ip_addressscanrandscanrand ip_address:allunicornscanunicornscan [options `b:B:d:De:EFhi:L:m: ...netenumnetenum network/netmask timeoutfpingfping -a -d hostname/ (Network/Subnet_Ma ...Firewall Specific Toolsfirewalk firewalk -p [protocol] -d [destination_ ...ftesterhost 1 ./ftestd -i eth0 -v host 2 ./ftes ...VOIP Specific ToolsSiVussipsakTracing paths: - sipsak -T -s sip:userna ...Options request:- sipsak -vv -s sip:user ...Query registered bindings:- sipsak -I -C ...smapsmap IP_Address/Subnet_Masksmap -o IP_Address/Subnet_Masksmap -l IP_AddressSipscanDefault Passwords (Examine list)Passwords APasswords BPasswords CPasswords DPasswords EPasswords FPasswords GPasswords HPasswords IPasswords JPasswords KPasswords LPasswords MPasswords NPasswords OPasswords PPasswords RPasswords SPasswords TPasswords UPasswords VPasswords WPasswords XPasswords YPasswords ZPasswords (Numeric)Active HostsOpen TCP PortsClosed TCP PortsOpen UDP PortsClosed UDP PortsService ProbingSMTP Mail BouncingBanner GrabbingOtherHTTPCommandsJUNK / HTTP/1.0HEAD / HTTP/9.3OPTIONS / HTTP/1.0HEAD / HTTP/1.0ExtensionsWebDAVASP.NETFrontpageOWAIIS ISAPIPHPOpenSSLHTTPSUse stunnel to encapsulate traffic.SMTPPOP3FTPIf banner altered, attempt anon logon an ...ICMP ResponsesType 3 (Port Unreachable)Type 8 (Echo Request)Type 13 (Timestamp Request)Type 15 (Information Request)Type 17 (Subnet Address Mask Request)Responses from broadcast addressSource Port ScansTCP/UDP 53 (DNS)TCP 20 (FTP Data)TCP 80 (HTTP)TCP/UDP 88 (Kerberos)Firewall AssessmentFirewalkTCP/UDP/ICMP responsesOS FingerprintEnumerationFTP port 21 opentelnet ip_address 21 (Banner grab)Run command ftp ip_addressftp@example.comCheck for anonymous accessftp ip_address
Username: anonymous OR an ...Hydra brute forceBrutusSSH port 22 openFingerprint servertelnet ip_address 22 (banner grab)Cisco SSH 1.25

telnet 192.168.1.1 22
Tr ...Open SSH 2.0

telnet 192.168.1.1 22
Tryi ...SSH Communications SSH 2.2.0

telnet 192 ...F-Secure SSH 1.3.6

telnet 192.168.1.1 2 ...scansshscanssh -p -r -e excludes random(no.)/Ne ...Password guessingssh root@ip_addressguess-who./b -l username -h ip_address -p 22 -2 < ...Hydra brute forceExamine sshd_config or similar filesputtytunnelierwinscpwinsshdReview hostkey filesTelnet port 23 openFingerprint servertelnetfptelnet ip_addressCommon Banner List
OS	/	Banner
Solaris 8 ...telnet -l "-froot" hostname (Solaris 10+ ...Password AttackCommon passwords
Manufacturer / Username ...Hydra brute forceBrutusSendmail Port 25 opentelnet ip_address 25 (banner grab)VRFY username (verifies if username exis ...EXPN username (verifies if username is v ...Mail Spoofing  - HELO anything MAIL FROM ...DNS port 53 openBile Suiteperl BiLE.pl [website] [project_name]perl BiLE-weigh.pl [website] [input file ...perl vet-IPrange.pl [input file] [true d ...perl vet-mx.pl [input file] [true domain ...perl exp-tld.pl [input file] [output fil ...perl jarf-dnsbrute [domain_name] (brutel ...perl qtrace.pl [ip_address_file] [output ...perl jarf-rev [subnetblock] [nameserver]digdig  [ @server  ]  [-b address ]  [-c cl ...hosthost  [-aCdlnrTwv  ]  [-c class ]  [-N n ...nslookupnslookup [ -option ...  ] [ host-to-find ...txdnstxdns -rt -t domain_nametxdns -x 50 -bb domain_nametxdns --verbose -fm wordlist.dic --serve ...whois
-h Use the named host to resolve t ...TFTP port 69 openSolarwinds TFTP servertftp ip_address PUT local_filetftp ip_address GET conf.txt (or other f ...Finger Port 79 openFinger scansfinger 'a b c d e f g h' @example.comfinger '1 2 3 4 5 6 7 8 9 0'@example.comfinger user@example.comfinger 0@example.comfinger .@example.comfinger **@example.comfinger test@example.comfinger @example.comFinger commandsfinger "|/bin/id@example.com"finger "|/bin/ls -a /@example.com"Finger Bouncefinger user@host@victimfinger @internal@externalWeb Ports 80, 8080 etc. openUse Firefox to enumerate information (se ...Telnet ip_address port (banner grab)Use NstealthUse WiktoUse Niktonikto [-h target] [options]Examine httpd.conf/ windows config filesProxy TestingSuruCrowbarParosBurpsuitehttprintlynx [options] startfile/URL Options inc ...NTP Port 123 openntpdc -c monlist IP_ADDRESSntpdc -c sysinfo IP_ADDRESSntpqhosthostnamentpversionversionreadlistSNMP port 161 openDefault Community Stringspublicprivateciscocable-docsisILMIMIBWindows NT.1.3.6.1.2.1.1.5 Hostnames.1.3.6.1.4.1.77.1.4.2 Domain Name.1.3.6.1.4.1.77.1.2.25 Usernames.1.3.6.1.4.1.77.1.2.3.1.1 Running Servic ....1.3.6.1.4.1.77.1.2.27 Share InformationSolarwinds MIB walkSolarwinds SNMP Brute ForceGetifSnscancat./cat  -h  <IP>  -w  SNMP.wordlistonesixtyoneonesixytone  -c  SNMP.wordlist  <IP>snmpwalksnmpwalk  -v  <Version>  -c  <Community  ...LDAP Port 389 Openldapminerldapminer -h ip_address -p port (not req ...bf_ldapbf_ldap -s server -d domain name -u|-U u ...ldpGui based toollumaGui based toolopenldapldapsearch  [-n]  [-u]  [-v]  [-k]  [-K] ...ldapadd [-c][-S file][-n][-v][-k][-K][-M ...ldapdelete  [-n][-v][-k][-K][-c][-M[M]][ ... ldapmodify  [-a][-c][-S file][-n][-v][- ...ldapmodrdn  [-r][-n][-v][-k][-K][-c][-M[ ...MS Windows NetBIOS Ports 135-139,445 ope ...Null Sessionnet use \192.168.1.1ipc$ "" /u:""net view \ip_address DumpsecRun superscanEnumeration tab.Run enumenum <-UMNSPGLdc> <-u username> <-p pass ...Run winfoRun Hydra brute forceRun BrutusRun NAT (NetBIOS Auditing Tool)Run Cain & AbelNetwork TabSQL Server Port 1433 1434 openSQLPing2SQL ReconSQL DictSQLATRun Hydra brute forcepiggySQLPATsqlbf -u hashes.txt -d dictionary.dic -r ...sqlbf -u hashes.txt -c default.cm -r out ...SQLPingsqlping ip_address/hostnameSQLverSQLpokeSQLlhfForceSQLCitrix  port 1494 openScanTCP 1494VersionPublished Applications./citrix-pa-scan {IP_address/file | - |  ...citrix-pa-proxy.pl IP_to_proxy_to [Local ...Default DomainOracle Port 1521 OpenRun WinSIDRun Oracle TNSLSNRWill respond to: [ping] [version] [statu ...Run TNSCmdperl tnscmd.pl -h ip_addressperl tnscmd.pl version -h ip_addressperl tnscmd.pl status -h ip_addressperl tnscmd.pl -h ip_address --cmdsize ( ...Run LSNrCheckRun OATsh opwg.sh -s ip_addressopwg.bat -s ip_addresssh oquery.sh -s ip_address -u username - ...Run OScannersh oscanner.sh -s ip_addressoscanner.exe -s ip_addresssh reportviewer.sh oscanner_saved_file.x ...reportviewer.exe oscanner_saved_file.xmlRun Oracle Security Check (needs credent ...Run NGS Squirrel for OracleUse DBVisualisorSql scripts from pentest.co.ukManual sql input of previously reported  ... Understanding SQL Injection SQL Injection walkthrough SQL Injection by example Advanced SQL Injection in Oracle databa ... Blind SQL InjectionOracle default password listTNSVertnsver host [port]Service RegisterService-register.exe ip_addressDNS/HTTP EnumerationSQL> SELECT UTL_INADDR.GET_HOST_ADDRESS( ...SQL> select utl_http.request('http://gla ...TCP Scanbreakable (Targets Application Server Po ...breakable.exe host url [port] [v]
host   ...SQLInjector (Targets Application Server  ...sqlinjector -t ip_address -a database -f ...sqlinjector.exe -t ip_address -p 7777 -a ...SidguessCheck PasswordRepscanNFS Port 2049 openshowmount -e hostname/ip_addressmount -t nfs ip_address:/directory_found ...Interact with NFS share and try to add/d ...Exploit and Confuse UnixCompaq/HP Insight Manager Port 2301,2381 ...Authentication MethodHost OS AuthenticationDefault AuthenticationDefault PasswordsWiktoNstealthHydraRDesktop port 3389 openRemote Desktop ConnectionTSGrinderSybase Port 5000+ opensybase-version ip_address from NGSUse DBVisualiserSybase Security checksheetCopy output into excel spreadsheetEvaluate mis-configured parametersManual sql input of previously reported  ... Advanced SQL Injection in SQL Server More Advanced SQL InjectionSIP Port 5060 opennetcatnc IP_Address Portsmapsmap IP_Address/Subnet_Masksmap -o IP_Address/Subnet_Masksmap -l IP_AddresssipsakTracing paths: - sipsak -T -s sip:userna ...Options request:- sipsak -vv -s sip:user ...Query registered bindings:- sipsak -I -C ...tftp bruteforcerDefault dictionary file./tftpbrute.pl IP_Address Dictionary_fil ...SipscanVoIPauditVNC port 5900^ openScans5900^ for direct access.
5800 for HTTP a ...Password AttacksRemotePassword GuessvncrackPassword CrackvncrackPacket CapturePhoss
http://www.phenoelit.de/phossLocalRegistry LocationsHKEY_CURRENT_USERSoftwareORLWinVNC3HKEY_USERS.DEFAULTSoftwareORLWinVNC ...Decryption Key0x238210763578887X11 port 6000^ openxwdxwd -display 192.168.0.1:0 -root -out 19 ...Authentication MethodXauthXhostList open windowsScreenshotsKeystrokesReceivedTransmittedJet Direct 9100 openhijettaPassword crackingJohn the Ripper./unshadow passwd shadow > file_to_crack./john -single file_to_crack./john -w=location_of_dictionary_file -r ..../john -show file_to_crack./john --incremental:All file_to_crackCain & AbelLCPRainbow crackophcrackrainbow tables rcrack c:rainbowcrack*.rt -f pwfile.t ...fgdumpfgdump [-t][-c][-w][-s][-r][-v][-k][-l l ...pwdump6 pwdump [-h][-o][-u][-p] machineNameL0phtcrack (Note: - This tool was aquire ...Domain credentialsSniffingpwdump importsam importVulnerability Assessment - Utilising vul ...ManualPatch LevelsConfirmed VulnerabilitiesSevereHighMediumLowAutomatedReportsVulnerabilitiesSevereHighMediumLowToolsGFINessus (Linux)Nessus (Windows)NGS TyphonNGS Squirrel for OracleNGS Squirrel for SQLSARAMatriXayBiDiBlahSSAOval InterpreterXscanScanfiResourcesSecurity FocusMicrosoft Security BulletinCommon Vulnerabilities and Exploits (CVE ...National Vulnerability Database (NVD)The Open Source Vulnerability Database ( ...United States Computer Emergency Respons ...Computer Emergency Response TeamMozilla Security InformationSANSSecuriteamPacketStorm SecuritySecurity TrackerSecuniaVulnerabilities.orgntbugtraqWireless Vulnerabilities and Exploits (W ...Network BackboneGeneric ToolsetWireshark (Formerly Ethereal)Passive SniffingUsernames/PasswordsEmailPOP3SMTPIMAPFTPHTTPHTTPSRDPVOIPOtherFiltersip.src == ip_addressip.dst == ip_addresstcp.dstport == port_no.! ip.addr == ip_address (ip.addr eq ip_address and ip.addr eq ip ...Cain & AbelActive SniffingARP Cache PoisoningUsernames/PasswordsEmailPOP3SMTPIMAPFTPHTTPHTTPSRDPVOIPOtherDNS PoisoningRouting ProtocolsCisco-Torch./cisco-torch.pl <options> <IP,hostname, ...NTP-Fingerprintperl ntp-fingerprint.pl -t [ip_address]Yersiniap0f./p0f [ -f file ] [ -i device ] [ -s fil ...Manual Check (Credentials required)MAC Spoofingmac address changer for windowsmacchangerRandom Mac Address:- macchanger -r eth0madmacssmacTMACAS/400 AuditingRemote AuditingInformation GatheringNmap using common iSeries (AS/400) servi ...Unsecured services (Port;name;descriptio ...