Penetration tests on a very big network? APT2 can help you! A penetration test usually begins with a perimetral scan (es. using NMAP), after continues with a testing for services (and their default passwords).Finally performs testing of known exploits and if gets access starts with lateral movement. APT2 will help us to perform all this steps. APT2 […]
Category: Penetration Testing
You can access to a password protected computers in minutes, with a 5$ Raspberry Pi Zero and Node.js
Be careful, next time that you leave your computer unattended at your office!
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker!
Really useful for penetration testing purposes! If a program has been written in order to keep in memory some credentials in clear text, this can be a security risk. When you make a security assessment, it will be useful a tool that scans processes memory searching for cleartext passwords, like Mimikatz, a tool written by […]
Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery SMB Enumeration Python Local Web Server Mounting File Shares Basic Finger Printing SNMP Enumeration DNS Zone Transfers DNSRecon HTTP / HTTPS Webserver Enumeration […]