SEC‐335 Module 1 - skyleroriordan/my-tech-journal GitHub Wiki
Notes:
Vulnerability scanning Locates and fixes potential vulnerabilities
Penetration Testing Finds and exploits vulnerbulties. Finds and fixes proven vulnerabilities. Doesn't try to not get detected.
Red Teaming Tries to not get detected
5 stages of pen testing 1. Reconnaissance where targets are indentified. 2. Scanning for hosts and finding potential vulnerabilities. 3. Explotioning those vulnerabilities 4. Maintaining access (maintaining persistence, escalating privileges), 5. Reporting
Passive Recon OSINT, public info. Can use domain registration (ICANN). IP Registration (IANA). Google Dorking, Shodan
Passive Recon Tools
theHarvester (command line tool which queries search engines)
Netcraft (gives tech reports on sites)
Metagoofil (extracts metadata from public docs)
Active Recon Interact with target