• Browser Exploitation Framework (BeEF)
  • Ping is successful. With that, we




    Download 293.2 Kb.
    bet1/7
    Sana26.03.2024
    Hajmi293.2 Kb.
    #177268
      1   2   3   4   5   6   7
    Bog'liq
    7-converted
    17-маъруза КТваТ, Презентация1, 28-Forex-Patterns, Ginekologik onkologiya, Mashina va mexanizmlar haqida tushunchalar, 7 ¬½áßß 1 þÑÔóÑÓÔý ÓÒß߬¿® ´ºÙ¬, 4-topshiriq, Assessment 2 (1), anti, crocadiledocx, 15-amaliy topshiriq, Mavzu amaliy dasturiy ta’minot. Amaliy dasturlar paketi bilan is, Animatsion lavhalar yaratish, Ish ishlab chiqarish ergonomikasi-fayllar.org, Hayot faoliyati xavfsizligi


    Network Penetration Test in$ and Best Practices

    Chapter 4





    The ping is successful. With that, we have successfully found out the internal interface IP of the pfsense firewall.
    3. Now, ping the neighboring 10 addresses.
    By doing this, we were able to successfully ping 172.23.24.100, which is the IP address of the network administrator.
    So far, you, as the attacker, are successfully able to get the root privileges on the web server and map the internal network and known IP scheme that is being used inside the castled network.
    You now know that to take over the firewall, which is very necessary to expose everything on the public interface and wipe off the traces of your activities in the internal network, you must take over any machine that is on a local network. One of those machines will belong to the network administrator and he/she will surely be accessing the internal firewall interface, which they'll be assuming is on the 172.23.24.1 address.
    Now, focus on the vulnerabilities that you found on the web server.
    Stored XSS: Search and you will find that there is a stored XSS vulnerability in one of the pages of the web server. This is very useful for hooking and retrieving information kom legitimate users.
    Next, we will learn how BeEF can be used to test and exploit an XSS attack.


    Browser Exploitation Framework (BeEF)

    BeEF is a powerful tool for hooking and gathering information from victims. So, why not use it to proceed with our pen testing exercise?

    1. Start by using a snipt that will check the response of the vulnerable application:


    Download 293.2 Kb.
      1   2   3   4   5   6   7




    Download 293.2 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Ping is successful. With that, we

    Download 293.2 Kb.