As we know That Phases of hacking plays an very important role in Successfully Exploiting The System
so itz important to Fallow The Complete Set of Phases To Get high Chances of Exploiting The target system
So letus Start:
1St Step
FOORPRINTING
-=-==-==-=-=-=
Information gathering
Determining the range of the network
Identifying active machines
Identifying open ports and access points
OS fingerprinting
Fingerprinting services
Mapping the network
TOOLS USED
-=-==-=-=-=
Whois
SmartWhois
NsLookup
Sam Spade
Other Ifo to grab
-=-=-=-=-=-=-=-==-
Company contact names, email addresses and phone numbers
Companies Deals and other parties involved.
News on mergers and acquisition
Links to other company-related sites
Company's privacy policies
======================================================================================================================================
SCANNING
-=-=-=-== scanning Open ports
Scanning OS
Scanning Services on Ports
scanning Http Methods
Scanning Cgi-scripts
Scanning Versions of Services
Tools USed
=-=-=-=-=-
NMap
Ping
Traceroute
Superscan
Netcat
NeoTrace
Visual Route
===================================================================================================================================
ENUMERATION
=-=-=-=-=-=-=
The Goal of enumeration is to get the complete picture of the target:
Techniques USED
-=-=-=-=-=-=-=-=
Identify vulnerable user accounts and Obtaining Active Directory information
Using snmputil for Simple Network Management Protocol enumeration
Employ Windows DNS queries
Establish null sessions and conneection
======================================================================================================================================
EXPLOITATIOn
=-=-==-==-=-=
Exploiting the Founded Vulnerablities in the systems
TECHNIQUES USED
=-=-==-=-=-=-=-=-=
Attack Against WEB-SERVERS
SQL Injection
Cross Site Scripting
Code Injection
Session Hijacking
Directory Traversal
Attack against NETWORKS
Man in the Middle Attack
Spoofing
Firewall Traversal
WLAN
ARP Poisoining
Attack against SERVICES
Buffer Overflows
Format Strings
Dos
Authentication flaws
Comments
Post a Comment