Alibabacloud.com offers a wide variety of articles about penetration testing checklist, easily find your penetration testing checklist information here online.
How to perform Web penetration testing
Web penetration testing can be considered from the following aspects:
1. SQL Injection (SQL Injection)
(1) how to test SQL injection?
First, find the URL page with parameters passed, such as the search page, login page, and submit the comment page.
Note 1: If the parameter is not
subdomain information for google.com
---------------------------------
Searching google.com:80 ...
HostName:www.google.com
hostip:173.194.127.51
Searching altavista.com:80 ...
Found 1 Possible subdomain (s) for host google.com, searched 0 pages containing 0 results
All scans completed, exiting
From the output information, you can see the search to a subdomain. The subdomain has a Www.google.com,IP address of 173.194.127.51. the command is searched from the googl
Burp suite is an integrated suite developed by portswigger for Web penetration testing. It includes modules such as spider, starter (paid version), intruder, repeater, sequencer, decoder, and comparer, each module has its unique purpose, which brings great convenience to the testing work of professional and non-professional Web
Bkjia.com exclusive Article] When we conduct a Security penetration test, the first thing we need to do is to collect as much information as possible for the target application. Therefore, information collection is an essential step for penetration testing. This task can be completed in different ways,
By using search engines, scanners, simple HTTP requests, or s
. List all users of SQL ServerVi. Database account and passwordVii. listing tables in a databaseParameters:-D: Specify the database name--tables: List TablesResults:The results reflect a total of 34 tables.Viii. listing fields in a tableParameters:-D: Specify the database name-T: Specify a table to list fields--columns: Specify list fieldsResults:The results show that the UserB table contains 23 fields.Nine, the Storm field contentParameters:-C: Specify the field to be burst--dump: Export the re
1. Brief descriptionFor the purpose of learning, penetration testing is not necessary to be a real environment, we can build an internal network, the installation of virtual machines on their own host can complete the experimental requirements, but also more convenient.2. Installing virtual machines and related softwareIn order to add a host to our virtual network, we need to build several virtual machines,
1. Exploit purposeA simple understanding of known vulnerabilities in the network is not enough for integrated security control of networks and systems. There are many benefits to conducting targeted, comprehensive vulnerability testing.
jump out of the safe work of speculation and suspicion. The management team can also get the details necessary to implement remediation by providing critical infrastructure intrusion that leads to sensitive
Familiar with the infiltration process, the attack will be as simple as building blocks! First Step: Information collectionCollecting site information is very important to penetration testing, and the information you collect is often an unexpected surprise in your infiltration.1. Website structureYou can use the Scan tool to scan the directory, mainly sweep out the site administrator portal, some sensi
1. IntroductionMetasploit provides a number of friendly, easy-to-use tools for penetration testers. Metasploit was originally created by HD Moore and was later acquired by Radid7, a nexpose vulnerability scanner. During penetration testing, some of the work that can be done by hand can be done by Metasploit.The Metasploit needs to be updated frequently and the la
Information collection at the early stage of Penetration Testing
Information collection at the early stage of Penetration Testing
Everything starts with a URL.
Use Google Hacking to view the target website, such as site: www.baidu.com. You can view the main site information, site: baidu.com, and view information about
Penetration testing process, often encounter the server system for Linux-related situations, kitchen knives under the view of permissions, sometimes good luck or root permissions. A long time ago for the root of the Linux server, during the infiltration process I really do not know how to start. Later, I know, if it is root permission, we can see whether open 22 port, if it is open, very good, you can log o
Sqlmap is an open-source, popular penetration testing tool that automates the detection process and leverages some SQL injection flaws to take over the database service.SQLMAP supports HTTP cookie features, all of which can be used for two purposes:1. Cookie-based authentication when required by the Web application;2. Detect and use SQL injected values in such header fields.By default, Sqlmap supports get p
How to use "mathematical modeling-graph theory model" for automated intranet penetration testing
Privilege escalation in the Active Directory domain is an important part of the struggle between most intruders and the Intranet administrator. Although obtaining the permissions of the domain or enterprise intranet administrator is not the ultimate goal of evaluation, it often makes the target to be tested easi
nc.exetftp -i 192.168.11.70 get nc.exeC:\TRANSF~1>FTP method
Another very useful way to upload files is to use the FTP server. Because FTP transfers data over TCP, it performs integrity verification, so you can upload large files. We can use an FTP server like vsftpd on Linux.
# apt-get install vsftpd
After vsftpd is installed, Edit/etcvsftpd.confFile, cancel the commented local_enable and write_enable, and restart the service to upload the file.
To use a non-interactive script to upload files
IntroductionThis document mainly describes the knowledge required for penetration testing. PentesterLab is going to summarize the basic knowledge and most common vulnerabilities of the test into a CD.About this documentTreaty to be observedPentersterLab's penetration strategy complies with the Creative Commons Attribution-nonequalcial-NoDerivs 3.0 Unported Licens
Today listened to the various explanations of Daniel, in the heart felt particularly deep, as a novice infiltration, I summed up some infiltration skills1, the principle is the keyYou can read these books carefully, and only a deep understanding can become Daniel.A, SQL injection attack and defenseB, upload vulnerability attack and defenseC, XSS Cross-site scripting attack and defenseD, command execution vulnerability attack and defenseE, Kali penetration
of other target networks to send packets.#nmap-SL 192.168.1.6 192.168.1.1The Idle scan is an ideal anonymous scanning technology that sends data to the host 192.168.1.1 via 192.168.1.6 in the target network to get 192.168.1.1 open portsThere is a need for other scanning techniques, such as FTP Bounce (FTP bounce), fragmentation scan (fragment scanning), IP protocol scan (IP protocol scanning), discussed above are several of the most important scanning methods.Nmap OS Detection (O)One of the mos
Amazing technology: using php socket5 proxy for Intranet penetration testing
During penetration testing, we often encounter webshells, but webserver provides web services through web port ing on the Intranet. If you have protection software that causes abnormal server permissions, you cannot create socket proxy and po
In the spirit of good things we share the point of view, to share, I myself in the penetration testing process often used in some sites. If you have good suggestions and additions, you can leave a comment below.NavisecWebsite: http://navisec.itNetwork security personnel's Internet navigation, security personnel essential website. Website focused content, and not too much decoration, style is extremely conci
Penetration Testing Some ideas to share(1) Collection of website informationfirst determine the language in which the website is written. Or if there is a mix-up. This can be obtained by viewing the site source files, observing site links, capturing submission requests, and so on. (2) Crawling Site Directoryusing tools to crawl the site directory, you can assist in the previous step to make the results more
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.