Skip to main content

Posts

Showing posts from February, 2018

Blueprinting The Target Part - 5

Draw the Blueprint of the target Introduction   Drawing the blueprint of the target is putting together what you have discovered so far. We will not be performing any new ways of scanning but we will be putting together what we have found so far. It’s like inventorying the information gathered so that you can plan the attacks. Nmap Scans     So far, we have only performed the scans with nmap but haven’t stored the output or the results of the scans. Let’s just quickly give you the diagrammatic out of the nmap scans we performed with the NMAP GUI that is Zen-map. You can install this tool on the Ubuntu Box by simply typing the following command via Ubuntu Terminal. Command: sudo apt-get install zenmap.    Next , we will now put together the results of the scans so that we can blueprint the information gathered. Below diagram maps the network connectivity for the targeted network.   What we have discovered with NeXpose, let’s have a look and then w

Blueprinting The Target Part - 4

Vulnerability Assessment & Management Knowledge Base    Although we have presented vulnerability assessment & management as a part of the information gathering phase, it is a more dedicated and critical part of the information gathering, so it was worthwhile to keep it separate in a module. Information Gathered in previous module • Network Addresses information • Operating System Level information • Open Ports • Services Information • Work group level information Next what is required?    What we need now is the vulnerabilities discovery so that we can further move one more level to discover the weaknesses in the network. Tools required    To achieve our goal of detecting & discovering vulnerabilities in the network, we need vulnerability scanners so that they can perform the job and further gather information about the vulnerabilities. We already installed two vulnerabilities scanners in our virtual hacking lab environment. Let’s login to ou