当前位置:网站首页>Basis of penetration test
Basis of penetration test
2022-07-23 11:25:00 【GSflyy】
- Every step is worth a thousand miles , Not small flow into the sea
Penetration testing concept
- Penetration testing is a technology and method that simulates attacks , A security test method that frustrates the security control measures of the target system and obtains control access .
- Network penetration test is mainly based on CVE(Common Vulnerabilities and Exposures) Security vulnerabilities that have been found , Simulate the attack method of intruders to apply to the website 、 The server system and network equipment are tested for non-destructive attack .
The need for :
- There may be unknown risks in the new system
- Save against a rainy day
- After professional penetration testing , Even if the system is not broken , It can also prove that the previous defensive measures are effective .
- Professional penetration testing can effectively evaluate the security status of the system , Put forward reasonable improvement plan .
Classification of penetration test methods
- Black box testing
- White box testing
- Grey box testing
Penetration test By target
- Host operating system penetration test
- Database system penetration test
- Application system penetration test
- Network equipment penetration test
- Intranet penetration test
- Internet penetration test
Penetration testing process
- Pre interaction
- Determine scope : Time estimates 、 Scope determination 、 Q & a conversation 、 Identify test resources
- Goal planning : Set goals 、 Business analysis and demand analysis
- Establish communication channels : Emergency contact 、 Emergency response process 、 Progress reporting cycle 、 Encrypted communication , Contact information of the third party
- Interactively determine rules : Timeline 、 place 、 Control baseline 、 Disclosure of sensitive information
- Intelligence gathering
- DNS Probe 、 Operating system fingerprint discrimination 、 Apply discrimination 、 Account scanning 、 Configuration discrimination, etc
- Commonly used tools : Commercial network security vulnerability scanning software Nessus, Open source security tools Nmap etc. , Many built-in functions of the operating system can also be used for information collection :telnet、nslookup、IE etc.
- 21-ftp 22-ssh 80-http 443-openssl 445 --smb,ms08-067,ms17-010 1433 -mssql, Weak password 1521-oracle 3389 -win long-range , Weak password 6379-redis Unauthorized access , Weak password 8080-tomcat Loophole
- Black box web penetration : Known vulnerabilities CMS,sql Inject 、 Command injection 、 File upload includes reading 、xss、xxe、 Logical loopholes , Mail server : go fishing 、 Pass the password 、 password
- Threat modeling
- Use the information obtained by intelligence collection , Identify possible vulnerabilities
- Vulnerability analysis
- Analyze which attack methods are feasible , Focus on port and vulnerability scanning results
- Penetration attack
- Penetration attacks that conduct in-depth research and testing on the target system
- Include : Precision strike 、 Bypass the defense mechanism 、 Customize the penetration attack path 、 Bypass the monitoring mechanism 、 Trigger attack response control measures 、 Penetration code testing
- Post penetration attack
- Infrastructure Analysis 、 Plunder sensitive information 、 Hide the trace 、 Persistence
- The report

- Report submission

- Pre interaction
APT(Advanced persistent threat): High level persistent threat
- Concept : Use various advanced attack methods , Organize high-value goals 、 Have long-term persistent cyber attacks .
- describe :apt It refers to the attacker or attack organization through including 0day Loophole 、 Fishing and other means , A highly purposeful long-term control of a target in a highly secretive situation .
apt The analysis model : Network kill chain
- Reconnaissance information gathering
- Weaponization Weapon carrier , Get ready exp/payload
- Delivery Load delivery
- Exploitation Exploit
- Installation Install the implant ( Malware )
- Command & Control Establish remote control Easy access to
- Actions on Objective Achieve the desired effect
- Penetration testing and apt The difference between
- Purpose : The purpose of penetration test is to evaluate the security of computer network system , and apt The purpose of is to carry out organized and long-term continuous control of goals .
- Means and methods : Penetration test is to test the target by using the allowed simulated hacker attack , and apt Use any high-tech means to attack
- The results on : Penetration testing improves the security level of the target system ,apt It will be seriously damaged by the target system .
Standard penetration test process
information gathering
- whois: Domain name query
- whatweb: fingerprint identification
Identify website information , For example, what is used CMS, What server and what web Container, etc .
- tool.chinaz.com/subdomain/: Simple subdomain name query
- Fishing and social workers
Looking for Internet access
- 21-ftp 22-ssh 80-http 443-openssl、https 445 --smb,ms08-067,ms17-010 1433 -mssql, Weak password 1521-oracle 3389 -win long-range , Weak password 6379-redis Unauthorized access , Weak password 8080-tomcat Loophole
- Black box web penetration
- The old version cms, Document leakage ,sql Inject , Command injection , File upload includes reading ,xss,xxe, Logical loopholes
- Mail server
Authority maintenance and promotion
- Hide the back door
- Avoid using common keywords : If in php of use assert Instead of eval
- Use all kinds of back door writing , Such as hiding the back door in the picture 、404 Horse 、 Memory horse, etc .
404 Horse Use hander Function to write a 404 page , The original intention is to implement another php file
Memory horse means that the connection is re established when the Trojan horse is deleted , The cleaning method is shutdown and restart
In order to ensure smooth service, the server usually does not shut down
- What is permission maintenance ?
- When obtaining system user permissions or high-level user permissions , Gain long-term control of the target by hiding the back door and doing a good job of avoiding killing
- What is privilege escalation ?
- You may be a low authority user when entering the system , After taking measures, it will be promoted to high authority users
- Hide the back door
Intranet penetration
- Extranet 、DMZ District 、 Intranet
DMZ Area is the network area between the external network and the internal network
- Attack from the Internet , First, take DMZ Control authority of the zone , Then take this to launch penetration attacks on the intranet
- Extranet 、DMZ District 、 Intranet
Trace removal
- Clear history
- Clear the command execution record
- Clear the operation log
边栏推荐
- $attrs中的对象没有变化,但触发了watch监听?
- systemctl-service服务添加环境变量及模板
- C语言之二分查找法或折半查找法剖析(经典例题,经典解析)
- TypeScript介绍
- Web Component-自定义元素的生命周期
- Sorting out common SQL interview questions and answers
- The problem that GBK codec cannot decode may be caused by the file name
- Pycharm occupies C disk
- JS, pay attention to passing parameters. If it is a string, you need to add escape characters
- [untitled]
猜你喜欢

Machine learning algorithm for large factory interview (6) time series analysis

How pycharm packages OCR correctly and makes the packaged exe as small as possible

自定义MVC的使用&增删改查

Error handling of "listener not started or database service not registered" in Oracle database creation
![[pytho-flask笔记5]蓝图简单使用](/img/0a/00b259f42e2fa83d4871263cc5f184.png)
[pytho-flask笔记5]蓝图简单使用

pyspark学习笔记

动态设置卡片的主题色

大厂面试机器学习算法(6)时间序列分析

基于el-table的树形表格及js-xlsx实现下载excel功能(二)
![[Doris]配置和基本使用contens系统(有时间继续补充内容)](/img/74/21c5c0866ed6b1bb6f9a1e3755b61e.png)
[Doris]配置和基本使用contens系统(有时间继续补充内容)
随机推荐
C语言之二分查找法或折半查找法剖析(经典例题,经典解析)
MySQL之账号管理&&四大引擎&&建库建表
Web server failed to start. Port 8080 was already in use.
Paging and filtering
【uiautomation】键指令大全(以及三种调用方式)+常用鼠标动作+SendKeys+Inspect学习
[untitled]
文件上传漏洞原理
Constructor, prototype chain, instanceof
pyspark学习笔记
牛客刷题记录--Mysql
Getting started with RPC and thrift
自定义MVC(上)
MySQL之函数&视图&导入导出
高阶函数的应用:手写Promise源码(二)
页面实现 “实时数据响应” 的注意事项
Uscd pedestrian anomaly data set user guide | quick download
js的闭包的理解
Error when PLSQL creates Oracle Database: when using database control to configure the database, it is required to configure the listener in the current Oracle home directory. You must run netca to co
解决手动查询Oracle数据库时间格式不正确的问题(DATE类型)
[Doris]配置和基本使用contens系统(有时间继续补充内容)

