Penetration Testing Framework 0.4

Author: Toggmeister (a.k.a Kev Orrey) & Lee Lawson

 

Changes:

 

Penetration Testing FrameworkPre-Inspection Visit - templateNetwork Footprinting (Reconnaissance) Th ...Whois is widely used for querying author ...Authoritive BodiesIANA - Internet Assigned Numbers Authori ...ICANN - Internet Corporation for Assigne ...NRO - Number Resource OrganisationRIR - Regional Internet Registry AFRINIC - African Network Information Ce ...APNIC - Asia Pacific Network Information ...National Internet RegistryAPJIICNNICJPNICKRNICTWNICVNNICARIN - American Registry for Internet Nu ...LACNIC - Latin America & Caribbean Netwo ...RIPE - Reseaux IP Européens—Network Coor ...WebsitesDNS StuffOnline DNS one-stop shop, with the abili ...Fixed OrbitAutonomous System lookups and other onli ...GeektoolsKartooMetasearch engine that visually presents ...NetcraftOnline search tool allowing queries for  ...RobtexExcellent website allowing DNS and AS lo ...Traceroute.orgWebsite listing a large number links to  ...Wayback MachineStores older versions of websites, makin ...Whois.netToolsIP2LocationSam SpadeCheops-ngShazouDomain Research ToolFirefox AS Number PluginCountry whoisSmart whoisInternet SearchGeneral InformationWeb InvestigatorTracesmartFriends ReunitedEbay - profiles etc.FinancialEDGAR - Company information, including r ...Google Finance - General Finance PortalHoovers - Business Intelligence, Insight ...Companies House UKLand Registry UKPhone book/ Electoral Role Information411 - Online White Pages and Yellow Page ...Abika - Background Check, Phone Number L ...Zabasearch - People Search Engine. US192.com - Electoral Role Search. UKBT.com. UKResidentialBusinessCode SearchGoogle Hacking DatabaseGeneric Web SearchingLinked To(See also Kartoo)Linked From(See also Kartoo)Forum EntriesEmail AddressesContact DetailsGHDB ResultsNewsgroups/forumsBack end files.exe / .txt / .doc / .ppt / .pdf / .vbs  ...DNS Record Retrieval from publically ava ...Types of Information RecordsSOA Records - Indicates the server that  ...MX Records - List of a host’s or domain’ ...NS Records - List of a host’s or domain’ ...A Records - An address record that allow ...PTR Records - Lists a host’s domain name ...SRV Records - Service location record.HINFO Records - Host information record  ...TXT Records - Generic text record.CNAME - A host’s canonical name allows a ...RP - Responsible person for the domain.Database SettingsVersion.bindSerialRefreshRetryExpiryMinimumSub DomainsInternal IP rangesReverse DNS for IP RangeZone TransferSocial EngineeringRemotePhoneScenariosIT Department.
"Hi, it's Zoe from the he ...ResultsContact DetailsNamePhone numberEmailRoom numberDepartmentRoleEmailScenariosHi there, I am currently carrying out an ...Good Morning,

The IT Department had a c ...SoftwareResultsContact DetailsNamePhone numberEmailRoom numberDepartmentRoleOtherLocalPersonasNameSuggest same 1st name.PhoneGive work mobile, but remember they have ...EmailHave a suitable email addressBusiness CardsGet cards printedContact DetailsNamePhone numberEmailRoom numberDepartmentRoleScenariosNew IT employeeNew IT employee.
"Hi, I'm the new guy in ...Fire InspectorTurning up on the premise of a snap fire ...ResultsMapsSatalitte ImageryBuilding layoutsOtherDumpster DivingWeb Site copyhtttrackteleport proBlack WidowDiscovery & Probing. Enumeration can ser ...Default Port ListsWindows*nixEnumeration tools and techniques - The v ...General Enumeration Toolsnmapnmap -n -A -P0 -p- -T Agressive -iL nmap ...nmap -sU -P0 -v -O -p 1-30000 -T polite  ...nmap -sV -P0 -v -p 21,22,23,25,53,80,443 ...grep "appears to be up" nmap_saved_filen ...netcatnc -v -w 2 -z IP_Address port_range/port ...nc -v -n IP_Address portamapamap [-A|-B|-P|-W] [-1buSRHUdqv] [[-m] - ...amap -bqv 192.168.1.1 80xprobe2xprobe2 192.168.1.1sinfp./sinfp.pl -i  -pnbtscannbtscan [-v] [-d] [-e] [-l] [-t timeout] ...hpinghping ip_addressscanrandscanrand ip_address:allunicornscanunicornscan [options `b:B:d:De:EFhi:L:m: ...netenumnetenum network/netmask timeoutfpingfping -a -d hostname/ (Network/Subnet_Ma ...Firewall Specific Toolsfirewalk firewalk -p [protocol] -d [destination_ ...ftesterhost 1 ./ftestd -i eth0 -v host 2 ./ftes ...VOIP Specific ToolsSiVussipsakTracing paths: - sipsak -T -s sip:userna ...Options request:- sipsak -vv -s sip:user ...Query registered bindings:- sipsak -I -C ...smapsmap IP_Address/Subnet_Masksmap -o IP_Address/Subnet_Masksmap -l IP_AddressSipscanDefault Passwords (Examine list)Passwords APasswords BPasswords CPasswords DPasswords EPasswords FPasswords GPasswords HPasswords IPasswords JPasswords KPasswords LPasswords MPasswords NPasswords OPasswords PPasswords RPasswords SPasswords TPasswords UPasswords VPasswords WPasswords XPasswords YPasswords ZPasswords (Numeric)Active HostsOpen TCP PortsClosed TCP PortsOpen UDP PortsClosed UDP PortsService ProbingSMTP Mail BouncingBanner GrabbingOtherHTTPCommandsJUNK / HTTP/1.0HEAD / HTTP/9.3OPTIONS / HTTP/1.0HEAD / HTTP/1.0ExtensionsWebDAVASP.NETFrontpageOWAIIS ISAPIPHPOpenSSLHTTPSUse stunnel to encapsulate traffic.SMTPPOP3FTPIf banner altered, attempt anon logon an ...ICMP ResponsesType 3 (Port Unreachable)Type 8 (Echo Request)Type 13 (Timestamp Request)Type 15 (Information Request)Type 17 (Subnet Address Mask Request)Responses from broadcast addressSource Port ScansTCP/UDP 53 (DNS)TCP 20 (FTP Data)TCP 80 (HTTP)TCP/UDP 88 (Kerberos)Firewall AssessmentFirewalkTCP/UDP/ICMP responsesOS FingerprintEnumerationFTP port 21 opentelnet ip_address 21 (Banner grab)Run command ftp ip_addressftp@example.comCheck for anonymous accessftp ip_address
Username: anonymous OR an ...Hydra brute forceBrutusSSH port 22 openFingerprint servertelnet ip_address 22 (banner grab)Cisco SSH 1.25

telnet 192.168.1.1 22
Tr ...Open SSH 2.0

telnet 192.168.1.1 22
Tryi ...SSH Communications SSH 2.2.0

telnet 192 ...F-Secure SSH 1.3.6

telnet 192.168.1.1 2 ...scansshscanssh -p -r -e excludes random(no.)/Ne ...Password guessingssh root@ip_addressguess-who./b -l username -h ip_address -p 22 -2 < ...Hydra brute forceExamine sshd_config or similar filesputtytunnelierwinscpwinsshdReview hostkey filesTelnet port 23 openFingerprint servertelnetfptelnet ip_addressCommon Banner List
OS	/	Banner
Solaris 8 ...telnet -l "-froot" hostname (Solaris 10+ ...Password AttackCommon passwords
Manufacturer / Username ...Hydra brute forceBrutusSendmail Port 25 opentelnet ip_address 25 (banner grab)VRFY username (verifies if username exis ...EXPN username (verifies if username is v ...Mail Spoofing  - HELO anything MAIL FROM ...DNS port 53 openBile Suiteperl BiLE.pl [website] [project_name]perl BiLE-weigh.pl [website] [input file ...perl vet-IPrange.pl [input file] [true d ...perl vet-mx.pl [input file] [true domain ...perl exp-tld.pl [input file] [output fil ...perl jarf-dnsbrute [domain_name] (brutel ...perl qtrace.pl [ip_address_file] [output ...perl jarf-rev [subnetblock] [nameserver]digdig  [ @server  ]  [-b address ]  [-c cl ...hosthost  [-aCdlnrTwv  ]  [-c class ]  [-N n ...nslookupnslookup [ -option ...  ] [ host-to-find ...txdnstxdns -rt -t domain_nametxdns -x 50 -bb domain_nametxdns --verbose -fm wordlist.dic --serve ...whois
-h Use the named host to resolve t ...TFTP port 69 openSolarwinds TFTP servertftp ip_address PUT local_filetftp ip_address GET conf.txt (or other f ...Finger Port 79 openFinger scansfinger 'a b c d e f g h' @example.comfinger '1 2 3 4 5 6 7 8 9 0'@example.comfinger user@example.comfinger 0@example.comfinger .@example.comfinger **@example.comfinger test@example.comfinger @example.comFinger commandsfinger "|/bin/id@example.com"finger "|/bin/ls -a /@example.com"Finger Bouncefinger user@host@victimfinger @internal@externalWeb Ports 80, 8080 etc. openUse Firefox to enumerate information (se ...Telnet ip_address port (banner grab)Use NstealthUse WiktoUse Niktonikto [-h target] [options]Examine httpd.conf/ windows config filesProxy TestingSuruCrowbarParosBurpsuitehttprintlynx [options] startfile/URL Options inc ...NTP Port 123 openntpdc -c monlist IP_ADDRESSntpdc -c sysinfo IP_ADDRESSntpqhosthostnamentpversionversionreadlistSNMP port 161 openDefault Community Stringspublicprivateciscocable-docsisILMIMIBWindows NT.1.3.6.1.2.1.1.5 Hostnames.1.3.6.1.4.1.77.1.4.2 Domain Name.1.3.6.1.4.1.77.1.2.25 Usernames.1.3.6.1.4.1.77.1.2.3.1.1 Running Servic ....1.3.6.1.4.1.77.1.2.27 Share InformationSolarwinds MIB walkSolarwinds SNMP Brute ForceGetifSnscancat./cat  -h  <IP>  -w  SNMP.wordlistonesixtyoneonesixytone  -c  SNMP.wordlist  <IP>snmpwalksnmpwalk  -v  <Version>  -c  <Community  ...LDAP Port 389 Openldapminerldapminer -h ip_address -p port (not req ...bf_ldapbf_ldap -s server -d domain name -u|-U u ...ldpGui based toollumaGui based toolopenldapldapsearch  [-n]  [-u]  [-v]  [-k]  [-K] ...ldapadd [-c][-S file][-n][-v][-k][-K][-M ...ldapdelete  [-n][-v][-k][-K][-c][-M[M]][ ... ldapmodify  [-a][-c][-S file][-n][-v][- ...ldapmodrdn  [-r][-n][-v][-k][-K][-c][-M[ ...MS Windows NetBIOS Ports 135-139,445 ope ...Null Sessionnet use \\192.168.1.1\ipc$ "" /u:""net view \\ip_address DumpsecRun superscanEnumeration tab.Run enumenum <-UMNSPGLdc> <-u username> <-p pass ...Run winfoRun Hydra brute forceRun BrutusRun NAT (NetBIOS Auditing Tool)Run Cain & AbelNetwork TabSQL Server Port 1433 1434 openSQLPing2SQL ReconSQL DictSQLATRun Hydra brute forcepiggySQLPATsqlbf -u hashes.txt -d dictionary.dic -r ...sqlbf -u hashes.txt -c default.cm -r out ...SQLPingsqlping ip_address/hostnameSQLverSQLpokeSQLlhfForceSQLCitrix  port 1494 openScanTCP 1494VersionPublished Applications./citrix-pa-scan {IP_address/file | - |  ...citrix-pa-proxy.pl IP_to_proxy_to [Local ...Default DomainOracle Port 1521 OpenRun WinSIDRun Oracle TNSLSNRWill respond to: [ping] [version] [statu ...Run TNSCmdperl tnscmd.pl -h ip_addressperl tnscmd.pl version -h ip_addressperl tnscmd.pl status -h ip_addressperl tnscmd.pl -h ip_address --cmdsize ( ...Run LSNrCheckRun OATsh opwg.sh -s ip_addressopwg.bat -s ip_addresssh oquery.sh -s ip_address -u username - ...Run OScannersh oscanner.sh -s ip_addressoscanner.exe -s ip_addresssh reportviewer.sh oscanner_saved_file.x ...reportviewer.exe oscanner_saved_file.xmlRun Oracle Security Check (needs credent ...Run NGS Squirrel for OracleUse DBVisualisorSql scripts from pentest.co.ukManual sql input of previously reported  ... Understanding SQL Injection SQL Injection walkthrough SQL Injection by example Advanced SQL Injection in Oracle databa ... Blind SQL InjectionOracle default password listTNSVertnsver host [port]Service RegisterService-register.exe ip_addressDNS/HTTP EnumerationSQL> SELECT UTL_INADDR.GET_HOST_ADDRESS( ...SQL> select utl_http.request('http://gla ...TCP Scanbreakable (Targets Application Server Po ...breakable.exe host url [port] [v]
host   ...SQLInjector (Targets Application Server  ...sqlinjector -t ip_address -a database -f ...sqlinjector.exe -t ip_address -p 7777 -a ...SidguessCheck PasswordRepscanNFS Port 2049 openshowmount -e hostname/ip_addressmount -t nfs ip_address:/directory_found ...Interact with NFS share and try to add/d ...Exploit and Confuse UnixCompaq/HP Insight Manager Port 2301,2381 ...Authentication MethodHost OS AuthenticationDefault AuthenticationDefault PasswordsWiktoNstealthHydraRDesktop port 3389 openRemote Desktop ConnectionTSGrinderSybase Port 5000+ opensybase-version ip_address from NGSUse DBVisualiserSybase Security checksheetCopy output into excel spreadsheetEvaluate mis-configured parametersManual sql input of previously reported  ... Advanced SQL Injection in SQL Server More Advanced SQL InjectionSIP Port 5060 opennetcatnc IP_Address Portsmapsmap IP_Address/Subnet_Masksmap -o IP_Address/Subnet_Masksmap -l IP_AddresssipsakTracing paths: - sipsak -T -s sip:userna ...Options request:- sipsak -vv -s sip:user ...Query registered bindings:- sipsak -I -C ...tftp bruteforcerDefault dictionary file./tftpbrute.pl IP_Address Dictionary_fil ...SipscanVoIPauditVNC port 5900^ openScans5900^ for direct access.
5800 for HTTP a ...Password AttacksRemotePassword GuessvncrackPassword CrackvncrackPacket CapturePhoss
http://www.phenoelit.de/phossLocalRegistry Locations\HKEY_CURRENT_USER\Software\ORL\WinVNC3\HKEY_USERS\.DEFAULT\Software\ORL\WinVNC ...Decryption Key0x238210763578887X11 port 6000^ openxwdxwd -display 192.168.0.1:0 -root -out 19 ...Authentication MethodXauthXhostList open windowsScreenshotsKeystrokesReceivedTransmittedJet Direct 9100 openhijettaPassword crackingJohn the Ripper./unshadow passwd shadow > file_to_crack./john -single file_to_crack./john -w=location_of_dictionary_file -r ..../john -show file_to_crack./john --incremental:All file_to_crackCain & AbelLCPRainbow crackophcrackrainbow tables rcrack c:\rainbowcrack\*.rt -f pwfile.t ...fgdumpfgdump [-t][-c][-w][-s][-r][-v][-k][-l l ...pwdump6 pwdump [-h][-o][-u][-p] machineNameL0phtcrack (Note: - This tool was aquire ...Domain credentialsSniffingpwdump importsam importVulnerability Assessment - Utilising vul ...ManualPatch LevelsConfirmed VulnerabilitiesSevereHighMediumLowAutomatedReportsVulnerabilitiesSevereHighMediumLowToolsGFINessus (Linux)Nessus (Windows)NGS TyphonNGS Squirrel for OracleNGS Squirrel for SQLSARAMatriXayBiDiBlahSSAOval InterpreterXscanScanfiResourcesSecurity FocusMicrosoft Security BulletinCommon Vulnerabilities and Exploits (CVE ...National Vulnerability Database (NVD)The Open Source Vulnerability Database ( ...United States Computer Emergency Respons ...Computer Emergency Response TeamMozilla Security InformationSANSSecuriteamPacketStorm SecuritySecurity TrackerSecuniaVulnerabilities.orgntbugtraqWireless Vulnerabilities and Exploits (W ...Network BackboneGeneric ToolsetWireshark (Formerly Ethereal)Passive SniffingUsernames/PasswordsEmailPOP3SMTPIMAPFTPHTTPHTTPSRDPVOIPOtherFiltersip.src == ip_addressip.dst == ip_addresstcp.dstport == port_no.! ip.addr == ip_address (ip.addr eq ip_address and ip.addr eq ip ...Cain & AbelActive SniffingARP Cache PoisoningUsernames/PasswordsEmailPOP3SMTPIMAPFTPHTTPHTTPSRDPVOIPOtherDNS PoisoningRouting ProtocolsCisco-Torch./cisco-torch.pl <options> <IP,hostname, ...NTP-Fingerprintperl ntp-fingerprint.pl -t [ip_address]Yersiniap0f./p0f [ -f file ] [ -i device ] [ -s fil ...Manual Check (Credentials required)MAC Spoofingmac address changer for windowsmacchangerRandom Mac Address:- macchanger -r eth0madmacssmacTMACAS/400 AuditingRemote AuditingInformation GatheringNmap using common iSeries (AS/400) servi ...Unsecured services (Port;name;descriptio ...  <head>
    <style type="text/css">
 ...Secured services (Port;name;description)  <head>
    <style type="text/css">
 ...NetCat (old school technique)nc -v -z -w target ListOfServices.txt |  ...Save list of secured and unsecured ports ...Banners GrabbingTelnetUsing TN5250Toolstn5250.sourceforce.netMochasoft (trial)SDI (Trial)Debian packageIBM Client Access iSeries (install for D ...Good How-To (in French).Security-Database transcription in engli ...Download the Package from locationConvert RPM to DEB packageAptitude install alienalien iSeriesAccess-XX.rpmInstalling Deb Packagedpkg -i iSeriesAccess-xxx.debRunning binary file/opt/ibm/iSeriesAccess/bin/ibm5250Sometimes this error occurs : error whil ...This means OpenMotif is missingAdd deb http://ftp2.fr.debian.org/ sid m ...aptitude updateaptitude install libmotif3Remove added line from /etc/apt/sources. ...After installing OpenMotif, this error s ...This means Lib Path to iseriesaccess cou ...You should add iseriesaccess (/opt/ibm/i ...run the command : ldconfigOld School hack : LD_LIBRARY_PATH=/opt/i ...Something elseSearch for binary using dpkg -L iseriesa ...FTPecho quit | nc -v target 21HTTP Bannerecho GET / | nc -v target 80Browser HTTP administrative (if availabl ...http://target:2001http://target:2010POP3 echo quit | nc target 110Basic POP3 retrieverGetMailSNMPSnmpwalkGFI LanguardSMTPSMTPSCanUser EnumerationDefault AS/400 users (UserID;PASSWORD1;P ...  <head>
    <style type="text/css">
 ...Error messagesTelnet Login errors  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...  <head>
    
  </head>
  <body>
  ...POP3 authentication ErrorsCPF2204: User profile XXXX not foundCPF22E2: Password not correct for User p ...CPF22E3: User profile XXXX is disabled CPF22E4: Password for User profile XXXX  ...CPF22E5: No Password associated with Use ...Qsys symbolic link (if ftp is enabled)ftp target  | quote stat | quote site na ...cd /quote site listfmt 1mkdir temp quote rcmd ADDLNK OBJ('/qsys.lib') NEWLN ...quote rcmd QSH CMD('ln -fs /qsys.lib /te ...dir /temp/qsys/*.usrprfHere you should list some profilsLDAPNeed os400-sys value from ibm-slapdSuffi ...Think to grab it using FTP from (QIBM/Us ...File slapd.conf  <head>
    <style type="text/css">
 ...or file ibmslapd.confResolve IP address.Telnet Value screen.  <head>
    <style type="text/css">
 ...Tool to browse LDAPLdapBrowserSee vulnerabilityassessment.co.uk reviewLDAP UtilityLuma Ldap brower and moreLdapSearch (unix utility)Enumeration  <head>
    <style type="text/css">
 ...More Advanced information on User  <head>
    <style type="text/css">
 ...ExploitationCVE ReferencesCVE-1999-1012 - Severity : Low - CVSS :  ...CVE-1999-1279 - Severity : Low - CVSS :  ...CVE-2000-1038 - Severity : Low - CVSS :  ...CVE-2002-1731 - Severity : Low - CVSS :  ...CVE-2002-1822 - Severity : Low - CVSS :  ...CVE-2005-0899 - Severity : Low - CVSS :  ...CVE-2005-0868 - Severity : High - CVSS : ...CVE-2005-1025 - Severity : Low - CVSS :  ...CVE-2005-1133 - Severity : Low - CVSS :  ...CVE-2005-1182 - Severity : Low - CVSS :  ...CVE-2005-1238 - Severity : High - CVSS : ...CVE-2005-1239 - Severity : Low - CVSS :  ...CVE-2005-1240 - Severity : High - CVSS : ...CVE-2005-1241 - Severity : High - CVSS : ...CVE-2005-1242 - Severity : Low - CVSS :  ...CVE-2005-1243 - Severity : Low - CVSS :  ...CVE-2005-1244 - Severity : High - CVSS : ...Access with Work Station Gatewayhttp://target:5061/WSGTry default AS/400 accounts.Network attacks (next release)DB2 QSHELLHijacking TerminalsTrojan attacksHacking from AS/400Local AuditingSystem Value Security  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...Recommended value is 30  <head>
    <style type="text/css">
 ...Password Policy  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...  <head>
    <style type="text/css">
 ...Audit level  <head>
    <style type="text/css">
 ...Recommended value is *SECURITYDocumentationSystem Audit Settings  <head>
    <style type="text/css">
 ...Special Authorities Definitions  <head>
    <style type="text/css">
 ...Users class  <head>
    <style type="text/css">
 ...Bluetooth Specific ToolsBluescannerBluesweepbtscannerRedfangBlueprintBluesnarferBluebuggerbluebugger [OPTIONS] -a <addr> [MODE]BlueserialBlooverBluesniffResourcesURL'sBlueStumbler.orgBluejackq.comBluejacking.comBluejackersibluejackedyou.comTrifiniteCommon Vulnerabilities and Exploits (CVE ...Vulnerabilties and exploit information r ...2007LG Chocolate KG800 phone allows remote a ...Nokia N70 phone allows remote attackers  ...Motorola MOTORAZR V3 phone allows remote ...Sony Ericsson K700i and W810i phones all ...White PapersBluesnarfingCisco Specific TestingScan & Fingerprint.Port ScanningnmapTo effectively scan a Cisco device, both ...Other toolsciscos is a scanner for discovering Cisc ...mass-scanner is a simple scanner for dis ...Fingerprintingcisco-torch
cisco-torch is a fingerprint ...nmap version scan.
Once open ports have  ...Password Guessing.CAT (Cisco Auditing Tool)
This tool  ext ...brute-enabler is an internal enable pass ...hydra
hydra is a multi-functional passwo ...SNMP Attacks.CAT (Cisco Auditing Tool)
This tool  ext ...onesixtyone is a reliable SNMP community ...snmpwalk
snmpwalk is part of the SNMP to ...Connecting.TelnetThe telnet service on Cisco devices can  ...VTY configuration:

BT / # telnet 10.1.1 ...External authentication server:

BT / #  ...SSHWeb BrowserHTTP/HTTPS

Web based access can be achi ...TFTPTrivial File Transfer Protocol is used t ...There are ways of extracting the config  ...Known Bugs.Common Vulnerabilities and Exploits (CVE ...Vulnerabilties and exploit information r ...2007Unspecified vulnerability in Cisco IOS 1 ...ATOMIC.TCP signature engine in the Cisco ...IPS feaure for Cisco IOS 12.3/4 allows r ...Cisco IOS post 12.3 with voice support a ...Cisco IOS allows remote attackers to cau ...Cisco IOS 9-12 allows remote attackers t ...Memory leak in the TCP Listener in Cisco ...Data-link switching in Cisco IOS 11-12.4 ...Attack ToolsCisco Global Exploiter (CGE)
CGE is an a ...perl cge.pl <target> <vulnerability numb ...HTTP Arbitrary Access vulnerability
A co ...Web browse to the Cisco device: 	http:// ...Click cancel to the logon box and enter  ...To raise the logging level to only log e ...To add a rule to allow Telnet: 	

http:/ ...ios-w3-vuln
CLI tool that automatically  ... ./ios-w3-vul 192.168.1.1 fetch > /tmp/r ...Configuration Files.Configuration Files.
The relevant config ...!
version 12.2
service config
service t ...MethodologyScan & Fingerprint.The purpose of 'Scan & Fingerprint' is t ...Credentials Guessing.If a network engineer/administrator has  ...ConnectOnce you have identified the access cred ...Check for bugsTo check for known bugs, vulnerabilities ...Further your attackTo further the attack into the target ne ...Wireless PenetrationWireless ToolkitWireless DiscoveryAerosolAirfartAphopperApradarkarmaKismetMiniStumblerNetstumblerWellenreiterWifi HopperWirelessMonPacket CaptureAiropeekAirtrafApsniffCainWiresharkWEP/ WPA Password Attack ToolsAircrack-ptwAircrack-ng AircrackAirsnortcowpattywep attackwep crackAirbasewzcookLeap Attack Toolsasleapthc leap crackeranwrapFrame Generation SoftwareAirgobblerairpwnAirsnarfCommviewfake apvoid 11wifi tapwifitap -b <BSSID> [-o <iface>] [-i <ifa ...Mapping SoftwareKnsgemFile Format Conversion Toolsns1 recovery and conversion toolwarbablewarkiznizwarkizniz04b.exe  [kismet.csv]  [kismet. ...ivstoolsIDS ToolsWIDZWar ScannerSnort-WirelessAirDefenseAirMagnetWLAN discoveryUnencrypted WLANVisible SSIDSniff for IP rangeMAC authorisedMAC filteringSpoof valid MAC Linuxifconfig [interface] hw ether [MAC]macchangerRandom Mac Address:- macchanger -r eth0mac address changer for windowsmadmacsTMACSMACHidden SSIDDeauth clientAireplay-ngaireplay -0 1  -a [Access Point MAC] -c  ...CommviewTools > Node reassociationVoid11void11_penetration  wlan0 -D  -t 1 -B [M ...WEP encrypted WLANVisible SSIDWEPattackwepattack -f [dumpfile] -m [mode] -w [wo ...Capture / Inject packetsBreak WEPAircrack-ptwaircrack-ptw [pcap file]Aircrack-ngaircrack  -q  -n  [WEP key length]  -b [ ...AirsnortChannel > StartWEPcrackperl WEPCrack.pl ./pcap-getIV.pl -b 13 -i wlan0Hidden SSIDDeauth clientAireplay-ngaireplay -0 1  -a [Access Point MAC] -c  ...CommviewTools > Node reassociationVoid11void11_hoppervoid11_penetration  [interface] -D -s [t ...WPA / WPA2 encrypted WLANDeauth clientCapture EAPOL handshakeWPA / WPA 2 dictionary attackcoWPAtty./cowpatty -r  [pcap file] -f [wordlist] ..../genpmk  -f  dictionary_file  -d hashfi ..../cowpatty  -r  cature_file.cap  -d  has ...Aircrack-ngaircrack-ng -a 2 -w [wordlist] [pcap fil ...LEAP encrypted WLANDeauth clientBreak LEAPasleap./asleap  -r  data/libpcap_packet_captur ..../genkeys  -r  dictionary_file  -f  outp ...THC-LEAPcrackerleap-cracker -f [wordlist] -t [NT challe ...802.1x  WLANCreate Rogue Access PointAirsnarfDeauth clientAssociate clientCompromise clientAcquire passphrase / certificatewzcookObtain user's certificatefake apperl fakeap.pl --interface wlan0perl fakeap.pl --interface wlan0 --chann ...HotspotterDeauth client Associate clientCompromise clientAcquire passphrase / certificatewzcookObtain user's certificate KarmaDeauth client Associate clientCompromise clientAcquire passphrase / certificatewzcookObtain user's certificate ./bin/karma  etc/karma-lan.xmlLinux rogue APDeauth client Associate clientCompromise clientAcquire passphrase / certificatewzcookObtain user's certificate ResourcesURL'sWirelessdefence.orgWardrive.netWireless Vulnerabilities and Exploits (W ...White PapersBreaking 104 bit WEP in less than 60 sec ...Weaknesses in the Key Scheduling Algorit ...802.11b Firmware-Level AttacksWireless Attacks from an Intrusion Detec ...Implementing a Secure Wireless Network f ...Common Vulnerabilities and Exploits (CVE ...Vulnerabilties and exploit information r ...2007Multiple cross-site scripting (XSS) vuln ...Aruba Mobility Controllers and Alcatel-L ...Heap-based buffer overflow in the manage ...Intel 2200BG 802.11 Wireless Mini-PCI dr ...Wireless Assessment.  The following info ...Site MapRF MapLines of SightSignal CoverageStandard AntennaDirectional AntennaPhysical MapTriangulate APsSatellite ImageryNetwork MapMAC FilterAuthorised MAC AddressesReaction to Spoofed MAC AddressesEncryption Keys utilisedWEPKey LengthCrack TimeKeyWPA/PSKTKIPTemporal Key Integrity Protocol, (TKIP), ...KeyAttack TimeAESAdvanced Encryption Standard (AES) is an ...KeyAttack Time802.1xDerivative of 802.1x in useAccess PointsESSIDExtended Service Set Identifier, (ESSID) ...Broadcast ESSIDsBSSIDsBasic service set identifier, (BSSID), u ...VendorChannelAssociationsRogue AP ActivityWireless ClientsMAC AddressesVendorOperating System DetailsAdhoc ModeAssociationsIntercepted TrafficEncryptedClear TextServer Specific TestsDatabasesDirect Access InterrogationMS SQL ServerPortsUDPTCPVersionSQL Server Resolution Service (SSRS)OtherosqlAttempt default/common accountsRetrieve dataExtract sysxlogins tableOraclePortsUDPTCPTNS ListenerVSNUM Converted to hexPing / version / status / devug / reload ...Leak attackSQL PlusDefault Account/PasswordsDefault SID'sMySQLPortsUDPTCPVersionUsers/Passwordsmysql.userDB2InformixSybaseOtherScansDefault PortsNon-Default PortsInstance NamesVersionsPassword AttacksSniffed PasswordsCracked PasswordsHashesDirect Access GuessesVulnerability AssessmentAutomatedReportsVulnerabilitiesSevereHighMediumLowManualPatch LevelsMissing PatchesConfirmed VulnerabilitiesSevereHighMediumLowMailScansFingerprintManualAutomatedSpoofableTelnet spooftelnet target_IP 25

helo target.com
mai ...RelaysVPNScanning500 UDP IPSEC1723 TCP PPTP443 TCP/SSLnmap -sU -P0 -p 500 80.75.68.22-27ipsecscan 80.75.68.22 80.75.68.27Fingerprintingike-scan --showbackoff 80.75.68.22 80.75 ...PSK Crackikeprobe 80.75.68.27sniff for responses with C&A or ikecrackWebVulnerability AssessmentAutomatedReportsVulnerabilitiesSevereHighMediumLowManualPatch LevelsMissing PatchesConfirmed VulnerabilitiesSevereHighMediumLowPermissionsPUT /test.txt HTTP/1.0CONNECT mail.another.com:25 HTTP/1.0POST http://mail.another.com:25/ HTTP/1. ...ScansFingerprintingOtherHTTPCommandsJUNK / HTTP/1.0HEAD / HTTP/9.3OPTIONS / HTTP/1.0HEAD / HTTP/1.0GET /images HTTP/1.0PROPFIND / HTTP/1.0ModulesWebDAVASP.NETFrontpageOWAIIS ISAPIPHPOpenSSLFile Extensions.ASP, .HTM, .PHP, .EXE, .IDQHTTPSCommandsJUNK / HTTP/1.0HEAD / HTTP/9.3OPTIONS / HTTP/1.0HEAD / HTTP/1.0CommandsJUNK / HTTP/1.0HEAD / HTTP/9.3OPTIONS / HTTP/1.0HEAD / HTTP/1.0File Extensions.ASP, .HTM, .PHP, .EXE, .IDQDirectory Traversalhttp://www.target.com/scripts/..%255c../ ...Penetration - An exploit usually relates ...Password AttacksKnown AccountsIdentified PasswordsUnidentified HashesDefault AccountsIdentified PasswordsUnidentified HashesExploitsSuccessful ExploitsAccountsPasswordsCrackedUncrackedGroupsOther DetailsServicesBackdoorConnectivityUnsuccessful ExploitsResourcesSecuriteamExploits are sorted by year and must be  ...SecurityForestUpdated via CVS after initial installGovernmentSecurityNeed to create and account to obtain acc ...Red Base SecurityOracle Exploit site onlyWireless Vulnerabilities & Exploits (WVE ...Wireless Exploit SitePacketStorm SecurityExploits downloadable by month and year  ...SecWatchExploits sorted by year and month, downl ...SecurityFocusExploits must be downloaded individuallyMetasploitInstall and regualrly update via svnMilw0rmExploit archived indexed and sorted by p ...ToolsMetasploitManual SQL Injection Understanding SQL Injection SQL Injection walkthrough SQL Injection by example Blind SQL Injection Advanced SQL Injection in SQL Server More Advanced SQL Injection Advanced SQL Injection in Oracle databa ...SQL Power InjectorSecurityForestSPI Dynamics WebInspectCore ImpactCisco Global ExploiterPIXDosperl PIXdos.pl [ --device=interface ] [- ...CANVASVoIP SecuritySniffing ToolsAuthTool Cain & AbelEtherpeekNetDudeOrekaPSIPDumpSIPomaticSIPv6 AnalyzerVoiPongVOMIT Wireshark WIST - Web Interface for SIP Trace Scanning and Enumeration ToolsenumIAXfpingIAX EnumeratoriWar NessusNmapSIP Forum Test Framework (SFTF)SIPcrack SIP-Scan SiVuSSMAP snmpwalkVLANping VoIPAudit Packet Creation and Flooding ToolsIAXFlooder ./iaxflood sourcename destinationname nu ...INVITE Flooder./inviteflood  interface  target_user  t ...kphone-ddos RTP FlooderScapy Seagull SIPBomberSIPNessSIPpSIPsakSIP-Send-FunSpitterTFTP Brute Forceperl tftpbrute.pl  <tftpserver> <filelis ...UDP Flooder./udpflood source_ip target_destination_ ...UDP Flooder (with VLAN Support)./udpflood source_ip target_destination_ ...Fuzzing ToolsAsteroid Codenomicon VoIP FuzzersFuzzy PacketMu Security VoIP Fuzzing Platformohrwurm RTP FuzzerPROTOS H.323 FuzzerPROTOS SIP FuzzerSIP Forum Test Framework (SFTF)Sip-ProxySpirent ThreatExSignaling Manipulation ToolsAuthTool./authtool captured_sip_msgs_file -d dic ...BYE TeardownCheck Sync Phone Rebooter RedirectPoison./redirectpoison interface target_source ...Registration Adder Registration Eraser Registration Hijacker SIP-KillSIP-Proxy-KillSIP-RedirectRTPSipRogue Media Manipulation ToolsRTP InsertSound ./rtpinsertsound interface source_rtp_ip ...RTP MixSound./rtpmixsound interface source_rtp_ip so ...RTPProxyReferencesURL'sHacking Exposed VoIPTool Pre-requisitesHack Libraryg711conversionsVoIPsaCommon Vulnerabilities and Exploits (CVE ...Vulnerabilties and exploit information r ...2007AVM Fritz!Box 7050 allows remote attacke ...2006HTTP server in Linksys SPA-921 VoIP Desk ...PhoneCtrl.exe in Linksys WIP 330 Wireles ...Polycom SoundPoint IP 301 VoIP Desktop P ...Grandstream GXP-2000 VoIP Desktop Phone, ...FiWin SS28S WiFi VoIP SIP/Skype Phone, f ...Multiple unspecified vulnerabilities in  ...Uniden UIP1868P VoIP Telephone and Route ...Advantage Century Telecommunication (ACT ...ACT P202S IP Phone 1.01.21 running firm ...MPM SIP HP-180W Wireless IP Phone WE.00. ...Clipcomm CPW-100E VoIP 802.11b Wireless  ...ZyXel P2000W VoIP 802.11b Wireless Phone ...White PapersAn Analysis of Security Threats and Tool ...An Analysis of VoIP Security Threats and ...Hacking VoIP Exposed Hacking VoIP Wired and Wireless PhonesSecurity testing of SIP implementationsSIP Stack Fingerprinting and Stack Diffe ...Two attacks against VoIP VoIP Attacks! Physical SecurityBuilding SecurityMeeting RoomsCheck for active network jacks.Check for any information in room.LobbyCheck for active network jacks.Does receptionist/guard leave lobby?Accessbile printers?  Print test page.Obtain phone/personnel listing.Communal AreasCheck for active network jacks.Check for any information in room.Listen for employee conversations.Room SecurityResistance of lock to picking.What type of locks are used in 
building ...Ceiling access areas.Can you enter the ceiling space (above 
 ...WindowsCheck windows/doors for visible intruder ...Check visible areas for 
sensitive infor ...Can you video users logging on?Perimeter SecurityFence SecurityAttempt to verify that the whole of the  ...Exterior DoorsIf there is no perimeter fence, then det ...GuardsPatrol RoutinesAnalyse patrol timings to ascertain if a ...CommunicationsIntercept and analyse guard communicatio ...Entry PointsGuarded DoorsPiggybackingAttempt to closely follow employees into ...Fake IDAttempt to use fake ID to gain access.Access MethodsTest 'out of hours' entry methodsUnguarded DoorsIdentify all unguarded
entry points.Are doors secured?Check locks for resistance to lock picki ...WindowsCheck windows/doors for visible intruder ...Attempt to bypass sensors.Check visible areas for 
sensitive infor ...Office WasteDumpster Diving
Attempt to retrieve any  ...Final Report - template
hide
Penetration Testing Framework
hide
hidefull-1
hidefull-5
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hidewizard
hide
hidefull-1
hide
hidexmag
hide
hide
leafattach

*AUDLVL System auditing : System auditing events logged and may be audited

*OBJAUD Object auditing : Object auditing activity defined logged and may be audited

*AUTFAIL Authorized failure: All access failure,Incorrect Password or User ID logged and may be audited

*PGMFAIL System integrity violation : Blocked instructions,Validation failure,Domain violation logged and may be audited

*JOBDTA Job tasks : Job start and stop data(disconnect,prestart) logged and may be audited

*NETCMN Communication & Networking tasks : Action that occur for APPN filtering support logged and may be audited

*SAVRST Object restore: Restore(PGM,JOBD,Authority,CMD,System State) logged and may be audited

*SECURITY Security tasks: All security related functions(CRT/CHG/DLT/RST) logged and may be audited

*SERVICE Services HW/SW: Actions for performing HW or SW services logged and may be audited

*SYSMGT System management: Registration,Network,DRDA,SysReplay,Operational not logged and cannot be audited

*CREATE Object creation: Newly created objects, Replace exisitng objects logged and may be audited

*DELETE Object deletion: All deletion of external objects logged and may be audited

*OFCSRV Office tasks: Office tasks(system distribution directory,Mail) logged and may be audited

*OPTICAL Optical tasks: Optical tasks(add/remove optical cartridge,Autho) logged and may be audited

*PGMADP Program authority adoption: Program adopted authority, gain access to an object logged and may be audited

*OBJMGT Object management: Object management logged and may be audited

*SPLFDTA Spool management: Spool management logged and may be audited

hide
leafattach

All-Object Authority (*ALLOBJ) : This is the most powerful authority on any AS400 system. This authority grants the user complete access to everything on the system. A user with All-Object Authority cannot be controlled.

Service Authority (*SERVICE) : Service Authority provides the user with the ability to change system hardware and disk configurations, to sniff network traffic and to put programs into debug mode (troubleshooting mode) and see their internal workings. The system services tools include the ability to trace systems functions and to patch and alter user made and IBM delivered programs on disk

manipulate data on disk.

Save and Restore Authority (*SAVSYS) : This authority allows the user to backup and restore objects. The user need not have authority to those objects. The risk with SAVSYS Authority is that a user with this authority can save all objects (including the most sensitive files) to disk (save file), delete any object (with the Free Storage option), restore the file to an alternate library, and then view and alter the information. Should the user alter the information, they would have the ability to replace the production object with

their saved version.

System Configuration Authority (*IOSYSCFG) : System communication configuration authority can also be used to set up nearly invisible access from the outside as a security officer -- without needing a password. System Configuration Authority provides the ability to configure and change communication configurations (e.g. lines, controllers, devices), including the system's TCP/IP and Internet connection information.

Spool Control Authority (*SPLCTL) : Spool Control authority gives the user read and modify all spooled objects (reports, job queue entries, etc.) on your system. The user may hold, release and clear job and output queues, even if they are not authorized to those queues.

Security Administrator Authority (*SECADM) : Security Administrator grants the authority to create, change and delete user ID?s. This authority should be reserved to essential administration personnel only.

Job Control Authority (*JOBCTL) : Job Control Authority can be used to power down the system or to terminate subsystems or individual jobs at any time, even during critical operational periods. Job Control Authority provides the capability to control other user?s jobs as well as their spooled files and printers.

Audit Authority (*AUDIT) : Audit Authority puts a user in control of the system auditing functions. Such a user can manipulate the system values that control auditing and control user and object auditing. These users could also turn off auditing for sensitive objects in an effort to obscure certain actions

hide
hidefull-1
hide
hidefull-2
hidefull-2
hidefull-3
hide
hidefull-4
hide
hidefull-5
hide
Configuration Files.
The relevant configuration files that control a Cisco router have already been covered in Methodology | (5) Further your attack.

In the child to this entry is a sample running-config file from a Cisco 2600 router running IOS version 12.2.

Enable password.
The Holy Grail, the 'enable' password, the root level access to the router. There are two main methods of storing the enable password in a config file, type 5 and type 7, MD5 hashed and Viginere encryption respectively.
enable secret 5 $1$c2He$GWSkN1va8NJd2icna9TDA.

Type 7 should be avoided as it is extremely easy to crack, it can even be done by hand! They can be cracked with tools like "Cain & Abel" (www.oxid.it) and Boson's GetPass (bosondownload.com/utils/bos_getpass.exe). Even online at www.ibeast.com/content/tools/CiscoPassword/index.asp

An example Type 7 password is given below but does not exist in the example running-config file:
enable password 7 104B0718071B17

Type 5 password protection is much more secure. However, should an attacker get hold of the configuration file somehow, then the MD5 hash can be extracted and cracked offline with tools like "Cain & Abel". If you want to use "John The Ripper", then the hash should be extracted and entered into a text file as follows:
username:$1$c2He$GWSkN1va8NJd2icna9TDA.

The line that reads "enable password router", where "router" is the password, is the TTY console password which is superceeded by the enable secret password for remote access.




SNMP Settings.
If the target router is configured to use SNMP, then the SNMP community strings will be in the config file. It should have the read-only (RO) and may have the read-write (RW) strings.
snmp-server community Cisco RO
snmp-server community enable RW



Telnet Access.
If telnet is configured on the VTY (Virtual TTY) interface, then the credentials will be in the config file:
line vty 0 4
password telnet
login
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide
hide