👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • Introduction To Exploitation
  • Penetration Testing Execution Standard
  • Penetration Testing Phases
  • Exploitation Methodology:

Was this helpful?

  1. Exam Prep Notes
  2. Junior Penetration Tester (eJPTv2) - Notes
  3. Host & Network Penetration Testing

Exploitation

PreviousThe Metasploit Framework (MSF)NextVulnerability Scanning

Last updated 10 months ago

Was this helpful?

Introduction To Exploitation

  • Exploitation consists of techniques and tools used by adversaries/penetration testers to gain an initial foothold on a target system or network.

  • Successful exploitation will heavily depend on the nature and quality of information gathering and service enumeration performed on the target.

    We can only exploit a target if we know what is vulnerable - Unknown

  • So far, we have covered exploitation of Windows & Linux systems both manually and automatically, however, we still need to get a clearer picture of the exploitation methodology and the tools and techniques involved in the process.

The Penetration Testing Execution Standard (PTES) is a penetration testing methodology that was developed by a team of information security practitioners with the aim of addressing the need for a comprehensive and up-to-date standard for penetration testing.

Penetration Testing Phases

The following diagram outlines the various phases involved in a typical penetration test.

  1. Information Gathering:

    • This initial phase involves collecting as much data as possible about the target system or network. Techniques include scanning, reconnaissance, and OSINT (Open Source Intelligence) to identify potential vulnerabilities and entry points.

  2. Enumeration:

    • During enumeration, attackers actively probe the network to identify and extract detailed information about network resources, services, and active devices. This phase often includes identifying usernames, shares, and software versions.

  3. Exploitation:

    • In the exploitation phase, attackers leverage identified vulnerabilities to gain unauthorized access. This step often involves using tools and techniques to exploit weaknesses, such as buffer overflows, SQL injection, or cross-site scripting.

  4. Post Exploitation:

    • Post exploitation focuses on maintaining access, gathering further data, and escalating privileges. This phase includes activities like lateral movement within the network and installing backdoors for persistent access.

  5. Privilege Escalation:

    • Attackers attempt to increase their access rights within the system. By exploiting system misconfigurations or vulnerabilities, they elevate their privileges from a lower-level account to an administrator or root level.

  6. Maintaining Persistent Access:

    • Techniques are used to ensure ongoing access to the compromised system, even after reboots or attempts to remove the attacker. Methods include installing rootkits, creating hidden user accounts, and establishing backdoors.

  7. Clearing Tracks:

    • The final phase involves removing evidence of the attack to avoid detection. This can include deleting logs, modifying timestamps, and clearing command history to ensure the attacker’s presence remains unnoticed.

Exploitation Methodology:

  1. Identify Vulnerable Services:

    • Scan the target system to find services that are running and identify any known vulnerabilities associated with those services. This step is crucial for finding potential entry points.

  2. Identify & Prepare Exploit Code:

    • Once vulnerabilities are identified, the next step is to find or develop exploit code that can take advantage of those weaknesses. This might involve using pre-existing exploit scripts or writing custom code.

  3. Gaining Access:

    • Automated - MSF (Metasploit Framework): Use automated tools like Metasploit to launch exploits against the target system, which simplifies the process of finding and exploiting vulnerabilities.

    • Manual: Manually execute the exploit, which may require a deeper understanding of the vulnerability and the target system's architecture.

  4. Obtain Remote Access on Target System:

    • Successfully executing the exploit to gain a foothold in the target system. This often involves creating a remote shell or backdoor to maintain access.

  5. Bypass AV Detection:

    • Implement techniques to avoid detection by antivirus and other security measures. This could involve obfuscating the payload, using encryption, or leveraging zero-day exploits.

  6. Pivot on to Other Systems:

    • Use the compromised system as a stepping stone to access other systems within the same network. This involves mapping the network and exploiting other machines to expand control and access sensitive data.




Hacker's Mantra:Hackers are people, right? They really are; you know they mow lawns! What’s a hacker documentary? It’s a guy doing his laundry. - Flea

📚
📑
📶
💥
Penetration Testing Execution Standard
Penetration Testing Phases