Pentesting theory

Five stages of hacking

  1. Reconaissance
  2. Scanning and enumeration
  3. Gaining access
  4. Maintaining access
  5. Covering tracks

Physical/Social

  • Google street view
  • hunter.io
  • googling
    • filetype/ext
  • theharvester (emails, subdomains)
  • haveibeenpwned
  • bluto: brute force against have i been pwned
  • crt.sh: *.domain.com
  • wappalyzer: technologies on a website

Vulnerability scanners

  • Nessus
    • Pro edition
  • nikto
  • burp suite (for web apps)
    • Pro edition (400USD)

Information gathering

  • Find e-mail addresses:
    • [[hunter.io]]
    • [[phonebook.cz]]
    • https://clearbit.com/
  • Find subdomains
    • https://crt.sh/

Scanning and enumeration

nikto -h http://example.com
dirbuster