End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… ...
-
Upload
daniella-blankenship -
Category
Documents
-
view
220 -
download
0
Transcript of End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… ...
![Page 1: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/1.jpg)
ANATOMY OF A WEB PEN TEST
End-to-End Methodology
![Page 2: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/2.jpg)
Testing Phases
Reconnaissance Mapping Discovery Exploitation Repeat… Report
![Page 3: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/3.jpg)
Reconnaissance
Whois records Architecture diagrams IPs and Hostnames DNS information Google Searches Social Networks Blogs and Other Web Sites
![Page 4: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/4.jpg)
Whois[laa@lobo ~]$ whois generalstatics.com[Querying whois.verisign-grs.com]domain: generalstatics.comowner: Neale Pickettorganization: WoozleWorksemail: [email protected]: 2175 35th Stcity: Los Alamosstate: NMpostal-code: 87544country: USphone: +1.5055004666admin-c: CCOM-411473 [email protected]: CCOM-411473 [email protected]: CCOM-411473 [email protected]: ns1.afraid.org
contact-hdl: CCOM-411473person: Neale Pickettorganization: WoozleWorksemail: [email protected]: 2175 35th Stcity: Los Alamosstate: NMpostal-code: 87544country: USphone: +1.5055004666
source: joker.com live whois service
![Page 5: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/5.jpg)
Architecture Diagram
![Page 6: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/6.jpg)
Mapping Port scans Version Checking OS Fingerprinting Spidering Pieces/flow of the application
User/admin/public areasLogin screensConfiguration and ManagementSession identifiers
Learning the various components that make up a web application
![Page 7: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/7.jpg)
Network Scan
![Page 8: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/8.jpg)
Discovery
Focus is on finding issues User interfaces Information leakage Authentication systems Error messages Some exploitation will happen as part of
this stepDirectory browsing
![Page 9: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/9.jpg)
Directory Browsing
![Page 10: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/10.jpg)
Exploitation
Attacking the flaws in an applicationInjectionXSSAuthentication/Authorization bypass
Determine implications of an attackWhat can happen as a result…
What other parts of the application infrastructure are exposed through the attack?
![Page 11: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/11.jpg)
Repeat…
Some knowledge of the application may be gained that wasn’t found in the Recon, Mapping, or Discovery phases
Jump back into the workflow, utilizing the newly discovered information
![Page 12: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/12.jpg)
Reporting Documentation for Reporting is collected
during all phases Executive Summary
Appears first, but written lastAudience is management
IntroductionScope, objectives, personnel
MethodologyStep-by-step, including tools usedSufficient detail to allow verification and repeat of
test
![Page 13: End-to-End Methodology. Testing Phases Reconnaissance Mapping Discovery Exploitation Repeat… Report.](https://reader036.fdocuments.us/reader036/viewer/2022062322/56649e9e5503460f94ba095f/html5/thumbnails/13.jpg)
Reporting (2)
FindingsCategorized according to riskInclude recommendations
ConclusionsShort summaryLike Executive Summary, but audience is
technical Appendix
Permission memo, data discovered, tools outputs