· 8 years ago · Dec 04, 2016, 11:15 AM
1Information Gathering
2---------------------
3Information Gathering is a phase in which we try to gather as much as information we can about our target or victim machine, device, network etc.
4
5Its also known as pre hacking phase in which we gather and store info which is required to plan a successful attack.
6
7Simple Information Gathering
8----------------------------
9Network : Connected: 192.168.1.12
10
11Step 1: Scan the local machines along with you.
12Resource: Softperfect Network Scanner or Nmap or Angry IP Scanner
13
14Info Required
15-------------
161. Name of the machine (aka Host Name)
172. MAC Address of the machine
183. Total Number of Devices on network
194. IP address
20
21Intelligent Information Gathering
22---------------------------------
231.192.168.235.136 Target ????
24
25OS Info
26Service Pack / Kernal version
27Ports Open
28Ports Filterted (Behind the Firewall)
29Services Running on Each Port
30Version of the Service Running on Each port
31
32Required: Nmap Info gathering scanner
33
34SImple Scan: nmap 192.168.235.136
35
36Operating System Detection Scan
37nmap -O 192.168.235.136
38
39Version
40nmap -sV 192.168.235.136
41
42Ports
43nmap -sP 192.168.235.136
44
45Custom Port Scan
46nmap -p 443,445 192.168.235.136
47
48Top 100 TCP Ports
49nmap -sT top 100 192.168.235.136
50
51Top UDP
52nmap -sU top 100 192.168.235.136
53
54Aggressive Scan
55nmap -A 192.168.235.136
56
57OS Login Bypass
58---------------
59Windows :
60MAC
61Kon-Boot CD
62Without changing the password you can access the data of the system.
63
64user ----> login page --->welcome (HDD)
65
66user --->welcome(HDD)
67user--> login ---> welcome(HDD)
68
69Video:
70Home Work : Reset Linux Password Kali 2.0: https://www.youtube.com/watch?v=1zHvVDxKS14
71
72
73Security
74--------
751. Boot In Password
762. Syskey Password
773. Login Password
784. gpedit.msc
79
80Malware Illustration
81--------------------
82Introduction to Malwares
83
84Malwares: Any code which is designed to unstable any device and change its traditional settings as per required attack.
85
86Malwares
87- Virus
88- Worm
89- Trojan (RATs)
90Direct Trojan -> server.exe -> run -->8474 (Port)
91192.168.235.129 --> PC --> Run
92192.168.235.129:8474 Connected
93Network Trojan
94
95- Ransomware
96- Adware
97- Spyware
98- Botnets
99- Rootkits
100- Extension and Plugin Based Malwares
101
102
103Antivirus
104---------
1051. Virpe Antivirus or Internet Security Suite
106
107Firewall
1081. Zone Alarm 2016 Firewall
109
110Pen Drive or Removable Media
111----------------------------
1121. USB Disk Security - FREE
113
114Manual Ways of Detecting Trojan
115-------------------------------
116Port ???? XXXXX
117Windows: cmd --> netstat -b (With Admin Prv.)
118No Virus Thanks EXE Radar Pro
119
120Documentry Zero Days