phase 1: Mission Definition
- Define mission goals and targets
- Define the Rules of engagement
phase 2: Recon
- Gather publicy availble inforamtion.
phase 3: Footprinting
- Start building a network map.
- nmap scripts allow more functions to nmap
nmap --script <filename>|<category>|<directory>
nmap --script-help "ftp-* and discovery"
nmap --script-args <args>
nmap --script-args-file <filename>
nmap --script-help <filename>|<category>|<directory>
nmap --script-trace
phase 4: Exploitation/Initial Access
- research exploits
- test the exploit in a testing environment
- Gain a foothold in the network.
- phishing is one of the most common method to gain initail access
phase 5: Post-Exploitation
- Establish persistence
- Escalate privileges
- cover tracks/clean logs
- Exfiltrate data
report everything that you do!!!
The persional report used to track the steps taken during an operation.
- Tips
use Screen captures when applicable
- The key take aways that can be passed to an executive
- The formal version of your opnotes for used to pass to other team members.