Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Pen Test Main Map updated - source .mm now available
From: Marco Ivaldi <raptor () 0xdeadbeef info>
Date: Tue, 11 Jul 2006 12:07:57 +0200 (CEST)

On Mon, 10 Jul 2006, Toggmeister () vulnerabilityassessment co uk wrote:



After all your positive emails and responses I've made a number of
tweaks with my map and added extra content:


Just a few random comments (definitely not meant to be exhaustive) about
your map:

1) FTP (21/tcp):
        - ftp bounce attack (see nmap(1))
2) SSH (22/tcp):
        - user enumeration through OpenSSH/PAM (CVE-2003-0190)
3) TELNET (23/tcp):
        - user enumeration through misconfigured Cisco IOS (as implemented
          in my old bruteforcer http://www.0xdeadbeef.info/code/brutus.pl)
4) SMTP (25/tcp):
        - user enumeration through "RCPT TO" command (brutus.pl implements 
          this feature as well), most Sendmail configurations are affected
        - fingerprint the MTA using smtpscan
5) FINGER (79/tcp):
        - finger @hostname
        - finger "1234567890"@hostname (specially useful with Solaris;)
        - finger for common names/words (GECOS field in /etc/passwd)
        - finger for other "special" strings
6) SNMP (161/udp)
        - try SNMP spoofing
7) NETBIOS-SSN (139/tcp), MICROSOFT-DS (445/tcp):
        - use samba-tng's rpcclient (null session, user enumeration, etc.)
8) PROXY (8080/tcp, 3128/tcp, etc.)
        - test for CONNECT method
        - tunneling, etc.


Of course, for every service you should check for specific vulnerabilities
leading to information disclosure, remote access, privilege escalation,
potential DoS (as defined in your testing scope), and so on...  Moreover,
a lot of other checks are usually needed, specially for "complex" services
like HTTP/HTTPS/NETBIOS/etc.: not all of them are performed by automated
scanners or exploitation frameworks. But i suppose you already know that;)

There are plenty of interesting methodologies/checklists outta here which 
may turn out to be useful to improve your map -- nice work anyway!


Marco Ivaldi
Antifork Research, Inc.   http://0xdeadbeef.info/
3B05 C9C5 A2DE C3D7 4233  0394 EF85 2008 DBFD B707

This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]