Skip to content

Instantly share code, notes, and snippets.

@mttjohnson
Created January 22, 2019 16:57
Show Gist options
  • Save mttjohnson/ed0f4861352fef3b9cc6512c77b7bacc to your computer and use it in GitHub Desktop.
Save mttjohnson/ed0f4861352fef3b9cc6512c77b7bacc to your computer and use it in GitHub Desktop.
Pen Testing

2019-01-22: Andrew Howden (MageChat #security) shared some references:

Check the SSL certificate of the root domain for SAN domains: $ openssl x509 -in /tmp/certificate.txt -text -noout will show you certificate info

Run DNS Enumeration of the root domain over all TLDs Run DNS Enumeration of various phishing domains for the root TLD (If you have time) Run the combination.

  • Tools https://dnsdumpster.com/

  • Tools Most of the tools below ship with Kali Linux. Probably easier if you spin that up on a temporary partition.

Vulnerability scanners

Email Capture mailsnarf (monkey.org/~dugsong/dsniff) ARP Cache poisioning Caine and Abel (oxid.it) Protocol handler enumeration Duh.vbs DUHForMac MAC Spoofing Nothing Yet POST Enumeration Burp intruder Telephone number spoofing SpoofCard USB injection Switchblade HTTP Proxy Burp Proxy (portswigger.net/proxy) Port Scanner nmap Connectivity netcat (sending data over TCP/IP the easy way) https://github.com/aploium/shootback (TCP behind NAT / Firewall) IMSI https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector XSS Scan + Exploitation ZAP (OWASP) JSFuck (http://www.jsfuck.com/) XSS Hunter Magento Admin panel flaws Magento's admin router will match /index.phpadmin,index.phprss/catalog/notifystock,index.php///admin. Servers might be configured to match /admin, and thus we can thus bypass admin blocks. Downloader Magento's /downloader/ endpoint auths against the admin list, but does not include the normal admin fail2ban style blocking after {x} invalid attempts. This makes it susceptible to brute force.[1]. This appears to have been solved in CE 1.9.3[2] Resources https://charlesreid1.com/wiki/Man_in_the_Middle https://github.com/enaqx/awesome-pentest/blob/master/README.md https://attack.mitre.org/wiki/Main_Page https://support.hypernode.com/knowledgebase/how-to-protect-your-magento-store-against-brute-force/#What_does_Magereport_check_for

2019-01-22: Peter O'Callaghan (MageChat #security) [8:09 AM] https://www.youtube.com/watch?v=Qw1nNPiH_Go <- jam packed with tools to use for bug bounties, not exactly the same as pen testing, since a bunch of the earlier stuff is about recon, which is not (necessarily) so important during a Pen test. (edited)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment