Pentest Checklist

794
Pentest Checklist

Here we can see, “Pentest Checklist”

Network Penetration Testing Checklist

What is Penetration Testing?

Penetration testing is the procedure of analyzing a network because of its safety vulnerabilities by trained safety specialists (e.g. penetration evaluations or malicious hackers). The purpose of this type of test is to fortify the security vulnerabilities that the system might comprise, so the hacking system does not readily exploit (or take advantage of). It assists in detecting Open vents, Troubleshooting live programs, services and catching system banner ads.

List of top Network Pentest checklist

1. Host Discovery
2. Port Scanning
3. Banner Grabbing/OS Fingerprinting
4. Scan for Vulnerabilities
5. Draw Network Diagrams
6. Prepare Proxies
7. Document all Findings

Let us explain in short.

1. Host Discovery

Footprinting is your very initial and essential stage where data on your target process is accumulated.

DNS footprinting helps record DNS records, for example (A, MX, NS, SRV, PTR, SOA, CNAME) from the target domain name.

A— An album can be used to stage the domain, such as cybersguards.com, to its own hosting host’s IP address.

MX— Mail exchange documents accountable.

NS— NS documents identify the DNS servers in control of the domain name.

SRV— Distinguish documents for the support hosted on specific servers. PTR– Reverse DNS search; you may use the IP to connect the domain name with it.

Also See:  GM's EV roadmap is beginning to take shape

SOA— Record beginning; it is nothing but info regarding the DNS Zone and other DNS records from the DNS program.

CNAME– Cname maps a domain to another domain.

Live hosts, reachable hosts from the target network could be discovered using system scanning tools such as Advanced IP Scanner, NMAP, HPING3, NESSUS.

Ping & Ping Sweep:

root@kali:~# nmap -sn 192.168.169.128
root@kali:~# nmap -sn 192.168.169.128-20 To ScanRange of IP
root@kali:~# nmap -sn 192.168.169.* Wildcard
root@kali:~# nmap -sn 192.168.169.128/24 Entire Subnet

Whois data

To acquire Whois name and information host of a Site.

root@kali:~# whois testdomain.com

http://whois.domaintools.com/

https://whois.icann.org/en

Traceroute

Network Diagnostic tool which shows route transit and path delay in programs

root@kali:~# traceroute google.com

Online Tools

http://www.monitis.com/traceroute/

http://ping.eu/traceroute/

2. Port Scanning

Conduct port scanning tools like Nmap, Hping3, Netscan, Network monitor. These tools enable us to examine a host or server for open ports around the target system.

The open vents would be the gateway to allow attackers to install and enter malicious backdoor software.

root@kali:~# nmap –open cybersguards.com To find all open ports
root@kali:~# nmap -p 80 192.168.123.126 Specific Port
root@kali:~# nmap -p 80 192.168.123.126 Range of ports
root@kali:~# nmap -p “*”192.168.123.126 To scan all ports

Online Tools

http://www.yougetsignal.com/

https://pentest-tools.com/information-gathering/find-subdomains-of-domain

3. Banner Grabbing/OS Fingerprinting

Banner Grabbing / OS fingerprinting such as Telnet, IDServe, NMAP decides the target audience and operating platform.

Also See:  How to: Fix Rise of Nations Doesn’t Work in Windows 10

When you understand the target model and operating platform, we will need to recognize and exploit the vulnerabilities. Attempt to acquire the system controller.

root@kali:~# nmap -A 192.168.123.126
root@kali:~# nmap -v -A 192.168.123.126 with high verbosity level

Online Tools

https://www.netcraft.com/

https://w3dt.net/tools/httprecon

https://www.shodan.io/

4. Vulnerabilities scanning

Scan the system with GIFLanguard, Nessus, Retina CS, SAINT vulnerabilities.

These tools enable people to recognize vulnerabilities in the target system and functioning systems. You’re able to discover loopholes in the target system with these measures.

GFILanguard

It functions as a security adviser and provides patch management, vulnerability appraisal, and community auditing services.

Nessus

Nessus is a vulnerability scanner tool that seems like a bug in the program and finds a particular method to violate application safety.

  • Data collection
  • Identification of the server
  • Port scan
  • Choice of the plugin
  • Data reporting

5. Draw Network Diagrams

Draw a company network diagram that makes it possible to comprehend the network server’s logical system link route. LAN manager, LANstate, Favorable pinger, community perspective can draw on the network diagram.

6. Prepare Proxies

Train acts as a connection between two media devices. A proxy could shield the LAN from outside access.

We could anonymize web surfing with proxy servers and filter unwanted articles such as advertisements and lots more.

Also See:  Google Meet Group Calls Are Now Limited to 60 Minutes (for Free Gmail Users)

To conceal you from becoming captured, proxies such as Proxifier, SSL Proxy, Proxy Finder, etc.

7. Document all results

The final and most crucial step would be to record all of the Penetration test customs.

This document gives you the capacity to recognize possible vulnerabilities inside your system. After the vulnerabilities are decided, you can program counteractions accordingly.

You can download the principles and range of the worksheet here rules and extent sheet. Consequently, Pentest Checklist will help evaluate your system until it gets into actual issues that may result in severe declines in finance and value.

Important Tools used for Network Pen-testing

Frameworks

Kali Linux, Backtrack5 R3, Security Onion

Reconnaisance

Smartwhois, MxToolbox, CentralOps, dnsstuff, nslookup, DIG, netcraft

Discovery

Angry IP scanner, Colasoft ping tool, nmap, Maltego, NetResident,LanSurveyor, OpManager

Port Scanning

Nmap, Megaping, Hping3, Netscan tools pro, Advanced port scannerService Fingerprinting Xprobe, nmap, zenmap

Enumeration

Superscan, Netbios enumerator, Snmpcheck, onesixtyone, Jxplorer, Hyena,DumpSec, WinFingerprint, Ps Tools, NsAuditor, Enum4Linux, nslookup, Netscan

Scanning

Nessus, GFI Languard, Retina,SAINT, Nexpose

Password Cracking

Ncrack, Cain & Abel, LC5, Ophcrack, pwdump7, fgdump, John The Ripper,Rainbow Crack

Sniffing

Wireshark, Ettercap, Capsa Network Analyzer

MiTM Attacks

Cain & Abel, Ettercap

Exploitation

Metasploit, Core Impact

These are the absolute most crucial checklist you ought to center on networking testing.