Skip to content

Instantly share code, notes, and snippets.

@babywyrm
Last active March 12, 2020 02:43
Show Gist options
  • Save babywyrm/971e754b96fb5be760d211ab261070f8 to your computer and use it in GitHub Desktop.
Save babywyrm/971e754b96fb5be760d211ab261070f8 to your computer and use it in GitHub Desktop.
**** PENTEST PRE_CHECK ****
yum update ;; apt update|upgrade ;;
Is everything patched up? All definitions, all signatures, hashes, tools?
You're totally in-sync with personnel on the other side?
"Good-To-Go"
Verify these aren't broken please,
VMware|Fusion
Nessus
AutoRecon
nmapautomator
owaspzap
burp
python3
metasploit
exploitdb|searchsploit
(make sure everything is functionally sound)
!! seclists !!
+++++++++++++++++++++++++++++++++++++++++++++++ ++ ++
curl
enum4linux
gobuster
nbtscan
nikto
nmap
onesixtyone
oscanner
smbclient
smbmap
smtp-user-enum
snmpwalk
sslscan
svwar
tnscmd10g
whatweb
wkhtmltoimage
+++++++++++++++++++++++++++++++++++++++++++++++ ++ ++
Determination of the type of pentest (Blackbox, Whitebox)
Key objectives behind this penetration test
Location address and contact (if it is an onsite job)
Validation that the Authorization Letter has been signed
URL of the web application that is in scope and validation that is accessible
2 sets of credentials (normal and admin or a privilege user) and validation that are working
Determination of the environment (Production or UAT)
Number of static and dynamic pages
Testing Boundaries (DoS, Brute force attacks etc.)
Technologies (PHP, ASP, .NET, IIS, Apache, Operating system etc.)
Any VPN or port numbers are needed and verify those ahead of time
Any web services that the site may use.
Any pages that the client does not want to be tested.
Any pages that submit emails
IP address of the tester
Escalation contact
3rd parties that needs to be contacted in advance of the pentest
Web application firewalls and other IDS in place
Timeframe of the assessment (dates and hours)
Diagrams and any kind of documentation
Validation that a backup has been performed recently on the application
Other client requirements
+++++++++++++++++++++++++++++++++++++++++++++++ ++ ++
Nmap Examples
Basic Nmap scanning examples, often used at the first stage of enumeration.
COMMAND DESCRIPTION
nmap -sP 10.0.0.0/24
Ping scans the network, listing machines that respond to ping.
nmap -p 1-65535 -sV -sS -T4 target
Full TCP port scan using with service version detection - usually my first scan, I find T4 more accurate than T5 and still "pretty quick".
nmap -v -sS -A -T4 target
Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + traceroute and scripts against target services.
nmap -v -sS -A -T5 target
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + traceroute and scripts against target services.
nmap -v -sV -O -sS -T5 target
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection.
nmap -v -p 1-65535 -sV -O -sS -T4 target
Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + full port range scan.
nmap -v -p 1-65535 -sV -O -sS -T5 target
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + full port range scan.
+++++++++++++++++++++++++++++++++++++++++++++++ ++ ++
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment