Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: linux pen-test
From: Chris Benedict <chrisb () daemonnews org>
Date: Tue, 09 Aug 2005 20:56:29 -0500



okrehel () loews com wrote:
Bruno,

Tried to get application versions of these services and see if they have
any security flaws reported in the past.
Use "nc" or "telnet" to service, grab banners.

My 2 cents:
That is not always accurate though, the admin can easily modify a few lines of code and change the version number or anything else the banner displays.

SMTP maybe can list users,
port 80 could have
a web server with cgi or some application running bugs, run nikto or others
CGI scanners.
Maybe you can upload some code into the web server.  Be creative.
Maybe 110 pop3 can give you some info about users, perhaps you can brute
force some accounts there, etc...

Ondrej Krehel

<SNIP>

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault