General penetration process:
- Information gathering
- Asset information collection
- Next to the station
- Subdomain
- Public network ip, etc.
- Personal information collected
personal mailbox
- Asset information collection
- Extranet breakthrough
- Acquisition target public authority
Webshell
server system privileges - Environmental rights within the target PC,
individual employee PC,
- Acquisition target public authority
- Intranet breakthrough
- Determining the network topology
- Detecting other hosting services
- Looking for other network assets
- Determining the target location
- Lateral movement
Cracking
- Injection
SQL injection - Failure of the authentication, sensitive data leakage
weak passwords, password cracking
source code leak
Cookie forgery, Cookie bypass the
database file disclosure
logic bypass the login
backup file
password recovery