Nytro Posted December 18, 2011 Report Posted December 18, 2011 Professional Penetration TestingCreating and Operating a Formal Hacking LabThomas WilhelmTechnical EditorJan Kanclirz Jr.Pagini: 525Acknowledgments ................................................................................ xviiForeword ............................................................................................. xixPART 1 SETTING UPCHAPTER 1 Introduction ......................................................................... 3Introduction ....................................................................... 3About the Book .................................................................. 4Target Audience ............................................................. 4How to Use This Book .................................................... 5About the DVD ................................................................... 7Course Material .............................................................. 8Reference Material .......................................................... 8LiveCDs ......................................................................... 8Summary ......................................................................... 10Solutions Fast Track .......................................................... 10About the Book ............................................................ 10About the DVD ............................................................. 11Reference ......................................................................... 11CHAPTER 2 Ethics and Hacking ............................................................. 13Introduction ..................................................................... 13Why Stay Ethical? .............................................................. 15Black Hat Hackers ......................................................... 15White Hat Hackers ........................................................ 17Gray Hat Hackers .......................................................... 18Ethical Standards ............................................................... 19Certifications ................................................................ 19Contractor .................................................................... 19Employer ..................................................................... 20Educational and Institutional Organizations ....................... 21Computer Crime Laws ........................................................ 24Types of Laws ............................................................... 24Type of Computer Crimes and Attacks ............................. 24International Laws ......................................................... 30Safe Harbor and Directive 95/46/EC ................................ 31Getting Permission to Hack ................................................ 32Confidentiality Agreement .............................................. 32Company Obligations .................................................... 33Contractor Obligations ................................................... 34Auditing and Monitoring ................................................ 35Conflict Management ..................................................... 35Summary ......................................................................... 36Solutions Fast Track .......................................................... 36Why Stay Ethical? .......................................................... 36Ethical Standards ........................................................... 37Computer Crime Laws .................................................... 37Getting Permission to Hack ............................................ 37Frequently Asked Questions ............................................... 38Expand Your Skills ............................................................ 38References ........................................................................ 40CHAPTER 3 Hacking as a Career ............................................................ 43Introduction ..................................................................... 43Career Paths ..................................................................... 45Network Architecture ..................................................... 46System Administration ................................................... 47Applications and Databases ............................................ 48Certifications .................................................................... 49High-Level Certifications ................................................. 51Skill- and Vendor-Specific Certifications ............................ 65Associations and Organizations ........................................... 84Professional Organizations .............................................. 85Conferences .................................................................. 85Local Communities ........................................................ 92Mailing Lists ................................................................. 93Summary ......................................................................... 94Solutions Fast Track .......................................................... 95Career Paths ................................................................. 95Certifications ................................................................ 95Associations and Organizations ....................................... 96Frequently Asked Questions ............................................... 96Expand Your Skills ............................................................ 97CHAPTER 4 Setting Up Your Lab ........................................................... 101Introduction .................................................................... 101Personal Lab ................................................................... 102Keeping it Simple ........................................................ 102Equipment .................................................................. 102Software ..................................................................... 103Lab for Book Exercises ................................................. 103Corporate Lab ................................................................. 106Internal Labs ............................................................... 107External Labs .............................................................. 107Equipment .................................................................. 107Software ..................................................................... 108Protecting Penetration Test Data ........................................ 108Encryption Schemas ..................................................... 108Securing PenTest Systems ............................................. 110Mobile Security Concerns .............................................. 111Wireless Lab Data ........................................................ 112Additional Network Hardware ........................................... 112Routers ...................................................................... 113Firewalls .................................................................... 113Intrusion Detection System/Intrusion Prevention System . . . 114Summary ........................................................................ 114Solutions Fast Track ......................................................... 115Personal Lab ............................................................... 115Corporate Lab ............................................................. 115Protecting Penetration Test Data .................................... 115Additional Network Hardware ....................................... 115Frequently Asked Questions .............................................. 116Expand Your Skills .......................................................... 116Reference ....................................................................... 117CHAPTER 5 Creating and Using PenTest Targets in Your Lab ...................... 119Introduction .................................................................... 119Turn-Key Scenarios versus Real-World Targets ..................... 120Problems with Learning to Hack .................................... 120Real-World Scenarios ................................................... 121Turn-Key Scenarios .......................................................... 122What is a LiveCD? ........................................................ 123De-ICE ....................................................................... 123Hackerdemia ............................................................... 127pWnOS ...................................................................... 128Foundstone ................................................................. 131Open Web Application Security Project ........................... 132Using Exploitable Targets ................................................. 136Operating Systems ....................................................... 136Applications ................................................................ 137Analyzing Malware – Viruses and Worms ............................ 137Setting up a Lab .......................................................... 138Other Target Ideas ........................................................... 144CTF Events ................................................................. 145Web-Based Challenges ................................................. 145Vulnerability Announcements ........................................ 146Summary ........................................................................ 147Solutions Fast Track ......................................................... 148Turn-Key Scenarios versus Real-World Targets ................. 148Turn-Key Scenarios ...................................................... 148Using Exploitable Targets ............................................. 148Analyzing Malware – Viruses and Worms ........................ 148Other Target Ideas ....................................................... 149Frequently Asked Questions .............................................. 149Expand Your Skills .......................................................... 150References ...................................................................... 151CHAPTER 6 Methodologies .................................................................. 153Introduction .................................................................... 153Project Management Body of Knowledge ............................ 154Introduction to PMBOK ................................................ 155Initiating Process Group ............................................... 155Planning Process Group ............................................... 157Executing Process Group .............................................. 161Closing Process Group ................................................. 163Monitoring and Controlling Process Group ...................... 163Information System Security Assessment Framework ............ 166Planning and Preparation – Phase I ................................ 166Assessment – Phase II .................................................. 166Reporting, Clean-up, and Destroy Artifacts – Phase III ...... 170Open Source Security Testing Methodology Manual .............. 171Rules of Engagement ................................................... 172Channels .................................................................... 173Modules ..................................................................... 175Summary ........................................................................ 176viii ContentsSolutions Fast Track ......................................................... 177Project Management Body of Knowledge ........................ 177Information System Security Assessment Framework ........ 177Open Source Security Testing Methodology Manual .......... 178Frequently Asked Questions .............................................. 178Expand Your Skills .......................................................... 179References ...................................................................... 179CHAPTER 7 PenTest Metrics ................................................................ 181Introduction .................................................................... 181Quantitative, Qualitative, and Mixed Methods ...................... 182Quantitative Analysis .................................................... 182Qualitative Analysis ...................................................... 183Mixed Method Analysis ................................................. 185Current Methodologies ..................................................... 186Project Management Institute ........................................ 186ISSAF ......................................................................... 191OSSTMM .................................................................... 192Tool-Generated Reports ................................................ 193Summary ........................................................................ 194Solutions Fast Track ......................................................... 195Quantitative, Qualitative, and Mixed Methods .................. 195Current Methodologies ................................................. 195Frequently Asked Questions .............................................. 196References ...................................................................... 196CHAPTER 8 Management of a PenTest ................................................... 197Introduction .................................................................... 197Project Team Members ..................................................... 197Roles and Responsibilities ............................................. 198Organizational Structure ............................................... 202Project Management ......................................................... 206Initiating Stage ............................................................ 206Planning Stage ............................................................ 208Executing Stage ........................................................... 209Monitoring and Controlling ........................................... 211Closing Stage .............................................................. 211Summary ........................................................................ 214Solutions Fast Track ......................................................... 214Project Team Members ................................................. 214Project Management ..................................................... 214Frequently Asked Questions .............................................. 215Expand Your Skills .......................................................... 215References ...................................................................... 216PART 2 RUNNING A PENTESTCHAPTER 9 Information Gathering ......................................................... 219Introduction .................................................................... 219Passive Information Gathering ........................................... 221Web Presence ............................................................. 222Corporate Data ............................................................ 231WHOIS and DNS Enumeration ...................................... 233Additional Internet Resources ........................................ 236Active Information Gathering ............................................ 238DNS Interrogation ....................................................... 238E-mail Accounts ........................................................... 240Perimeter Network Identification ................................... 242Network Surveying ...................................................... 246Project Management ......................................................... 247Executing Process Phase ............................................... 248Monitoring and Control Process ..................................... 250Summary ........................................................................ 253Solutions Fast Track ......................................................... 253Passive Information Gathering ....................................... 253Active Information Gathering ........................................ 254Project Management ..................................................... 254Frequently Asked Questions .............................................. 254Expand Your Skills .......................................................... 255References ...................................................................... 257CHAPTER 10 Vulnerability Identification ................................................... 259Introduction .................................................................... 259Port Scanning .................................................................. 260Target Verification ....................................................... 261UDP Scanning ............................................................. 264TCP Scanning .............................................................. 265Perimeter Avoidance Scanning ....................................... 268System Identification ........................................................ 272Active OS Fingerprinting .............................................. 272Passive OS Fingerprinting ............................................. 272x ContentsServices Identification ...................................................... 275Banner Grabbing ......................................................... 276Enumerating Unknown Services .................................... 277Vulnerability Identification ................................................ 278Summary ........................................................................ 281Solutions Fast Track ......................................................... 281Port Scanning .............................................................. 281System Identification .................................................... 282Services Identification .................................................. 282Vulnerability Identification ............................................ 282Frequently Asked Questions .............................................. 282Expand Your Skills .......................................................... 283Reference ....................................................................... 284CHAPTER 11 Vulnerability Verification ..................................................... 285Introduction .................................................................... 285Exploit Codes – Finding and Running ................................. 287Internet Sites ............................................................... 287Automated Tools ......................................................... 290Exploit Codes – Creating Your Own ................................... 320Fuzzing ...................................................................... 322Code Review ............................................................... 324Application Reversing .................................................. 324Web Hacking .................................................................. 325SQL Injection .............................................................. 326Cross-Site Scripting ...................................................... 327Web Application Vulnerabilities ..................................... 330Project Management ......................................................... 332Executing Process Phase ............................................... 332Monitoring and Control Process ..................................... 333Summary ........................................................................ 334Solutions Fast Track ......................................................... 335Exploit Codes – Finding and Running ............................. 335Exploit Codes – Creating Your Own ............................... 335Web Hacking .............................................................. 335Project Management ..................................................... 335Frequently Asked Questions .............................................. 336Expand Your Skills .......................................................... 336References ...................................................................... 338CHAPTER 12 Compromising a System and Privilege Escalation ..................... 339Introduction .................................................................... 339System Enumeration ........................................................ 341Internal Vulnerabilities ................................................. 341Sensitive Data ............................................................. 347Network Packet Sniffing ................................................... 348Social Engineering ........................................................... 354Baiting ....................................................................... 355Phishing ..................................................................... 355Pretexting ................................................................... 355Wireless Attacks .............................................................. 356Wi-Fi Protected Access Attack ........................................ 357WEP Attack ................................................................. 362Project Management ......................................................... 364Executing Process Phase ............................................... 364Monitoring and Control Process ..................................... 365Summary ........................................................................ 365Solutions Fast Track ......................................................... 366System Enumeration .................................................... 366Network Packet Sniffing ............................................... 367Social Engineering ....................................................... 367Wireless Attacks .......................................................... 367Project Management ..................................................... 367Frequently Asked Questions .............................................. 368Expand Your Skills .......................................................... 368References ...................................................................... 369CHAPTER 13 Maintaining Access ........................................................... 371Introduction .................................................................... 371Shells and Reverse Shells .................................................. 372Netcat Shell ................................................................ 372Netcat Reverse Shell ..................................................... 376Encrypted Tunnels ........................................................... 379Adding a Host Firewall (Optional) ................................. 380Setting Up the SSH Reverse Shell ................................... 381Other Encryption and Tunnel Methods ............................... 386Summary ........................................................................ 387Solutions Fast Track ......................................................... 388Shells and Reverse Shells .............................................. 388Encrypted Tunnels ....................................................... 388Other Encryption and Tunnel Methods ........................... 388xii ContentsFrequently Asked Questions .............................................. 389Expand Your Skills .......................................................... 389Reference ....................................................................... 390CHAPTER 14 Covering Your Tracks ......................................................... 391Introduction .................................................................... 391Manipulating Log Data ..................................................... 392User Login .................................................................. 392Application Logs .......................................................... 396Hiding Files .................................................................... 397Hiding Files in Plain Sight ............................................ 398Hiding Files Using the File System ................................. 399Hiding Files in Windows .............................................. 402Summary ........................................................................ 404Solutions Fast Track ......................................................... 405Manipulating Log Data ................................................. 405Hiding Files ................................................................ 405Frequently Asked Questions .............................................. 405Expand Your Skills .......................................................... 406Reference ....................................................................... 406PART 3 WRAPPING EVERYTHING UPCHAPTER 15 Reporting Results .............................................................. 409Introduction .................................................................... 409What Should You Report? ................................................. 410Out of Scope Issues ..................................................... 410Findings ..................................................................... 411Solutions .................................................................... 412Manuscript Preparation ................................................ 412Initial Report ................................................................... 414Peer Reviews .............................................................. 415Fact Checking ............................................................. 415Metrics ....................................................................... 416Final Report .................................................................... 425Peer Reviews .............................................................. 425Documentation ............................................................ 426Summary ........................................................................ 437Solutions Fast Track ......................................................... 438What Should You Report? ............................................. 438Initial Report ............................................................... 438Final Report ................................................................ 438Frequently Asked Questions .............................................. 439Expand Your Skills .......................................................... 439References ...................................................................... 441CHAPTER 16 Archiving Data .................................................................. 443Introduction .................................................................... 443Should You Keep Data? .................................................... 443Legal Issues ................................................................ 444E-mail ........................................................................ 446Findings and Reports ................................................... 446Securing Documentation ................................................... 447Access Controls ........................................................... 448Archival Methods ......................................................... 448Archival Locations ....................................................... 449Destruction Policies ..................................................... 450Summary ........................................................................ 450Solutions Fast Track ......................................................... 451Should You Keep Data? ................................................ 451Securing Documentation ............................................... 451Frequently Asked Questions .............................................. 451Reference ....................................................................... 452CHAPTER 17 Cleaning Up Your Lab ........................................................ 453Introduction .................................................................... 453Archiving Lab Data .......................................................... 454Proof of Concepts ........................................................ 454Malware Analysis ......................................................... 455Creating and Using System Images ..................................... 455License Issues ............................................................. 455Virtual Machines .......................................................... 456“Ghost” Images ........................................................... 456Creating a “Clean Shop” ................................................... 457Sanitization Methods .................................................... 458Using Hashes .............................................................. 461Change Management Controls ....................................... 461Summary ........................................................................ 462Solutions Fast Track ......................................................... 462Archiving Lab Data ...................................................... 462Creating and Using System Images ................................. 463Creating a “Clean Shop” ............................................... 463Frequently Asked Questions .............................................. 463Reference ....................................................................... 463xiv ContentsCHAPTER 18 Planning for Your Next PenTest ............................................ 465Introduction .................................................................... 465Risk Management Register ................................................ 466Creating a Risk Management Register ............................. 466Prioritization of Risks and Responses ............................. 467Knowledge Database ........................................................ 468Creating a Knowledge Database ..................................... 468Sanitization of Findings ................................................ 469Project Management Knowledge Database ....................... 469After-Action Review ......................................................... 470Project Assessments ..................................................... 470Team Assessments ....................................................... 471Training Proposals ....................................................... 471Summary ........................................................................ 473Solutions Fast Track ......................................................... 473Risk Management Register ............................................ 473Knowledge Database .................................................... 474After-Action Review ..................................................... 474Frequently Asked Questions .............................................. 474Expand Your Skills .......................................................... 475Reference ....................................................................... 476Appendix A: Acronyms ............................................................................. 477Appendix B: Definitions ........................................................................... 489Index .................................................................................................. 495Download:http://rogunix.com/docs/Pentesting/Professional%20Penetration%20Testing:%20Creating%20and%20Operating%20a%20Formal%20Hacking%20Lab.pdfMirror:http://www.megaupload.com/?d=Z7YUTFMR Quote
malsploit Posted July 8, 2013 Report Posted July 8, 2013 Rogunix[dot]comdestul de multe materiale interesante acolo. Aruncati un click Quote