Penetration testing foundation
Knowledge of science
Script (asp, php, jsp)
html(css,js,html)
HTTP protocol
cms(B/S)
MD5
Broiler
Catching chickens
Webshell
Loophole
Word [Trojan]
Put right
back door
springboard
Standing-invasion
C segment invasion
- 1-255 scan all network sites CMS case
- To choose their own good at the invasion of CMS, in order to achieve more rapid invasion of segment C
- 1-255 scan all ports open case segment
- First query port, select the site they are good to mention the right to invade, the pain had to mention the right port
- Use the tools coconut, A D Web Toolkit,
- Black box testing
- Unlike hacking black box testing, the station does not mean black. Black Box Testing is a comprehensive test of the ability of (OS, Datebase, Script, code, ideas, social workers)
- To choose their own good at the invasion of CMS, in order to achieve more rapid invasion of segment C
- 1-255 scan all network sites CMS case
White-box testing: relative to the black box testing white box is basically initiated from within
Gray box testing: between one product based on the white box and black box
Penetration Testing Introduction
Penetration Testing Process
clear goal
- Determine the scope
- Determination rule
- Identify needs
collect message
- basic information
- system message
- Application Information
- Version Information
- Service Information
- Personnel information
- Information Protection
Vulnerability detection
- System vulnerabilities
- Websever Vulnerability
- web application vulnerabilities
- Other services Port Vulnerability
- Communication safety
Vulnerability verification
- Automatic verification
- Manual verification
- Login guess
- Business vulnerability verification
- The use of public resources
Report form
- Finishing on demand
- Additional information on
- Repair recommendations
Organize information
To obtain the required
Finishing penetration tool
Collating information
Finishing vulnerability information
Information Analysis
Precision strike
Bypass the defense mechanisms
Custom attack paths
Bypass the detection mechanism
Attack code
Information gathering is the key
Do not be too impatient to do things
To learn more, see the source code
Usually pay attention to gathering 0day
Ideas are important
Test environment security configuration