1.host Discovery: Ping&Ping Sweep
1.host Discovery: Ping&Ping Sweep
1.host Discovery: Ping&Ping Sweep
Open ports, Troubleshooting live systems, services and grabbing system banners.
Let’s see how we conduct a step by step Network penetration testing by using some famous
network scanners.
1.HOST DISCOVERY
Footprinting is the first and important phase were one gather information about their target
system.
DNS footprinting helps to enumerate DNS records like (A, MX, NS, SRV, PTR, SOA,
CNAME) resolving to the target domain.
A – A record is used to point the domain name such as gbhackers.com to the IP address of
it’s hosting server.
MX – Records responsible for Email exchange.
NS – NS records are to identify DNS servers responsible for the domain.
SRV – Records to distinguish the service hosted on specific servers.
PTR – Reverse DNS lookup, with the help of IP you can get domain’s associated with it.
SOA – Start of record, it is nothing but the information in the DNS system about DNS
Zone and other DNS records.
CNAME – Cname record maps a domain name to another domain name.
We can detect live hosts, accessible hosts in the target network by using network scanning tools
such as Advanced IP scanner, NMAP, HPING3, NESSUS.
Ping&Ping Sweep:
root@kali:~# nmap -sn 192.168.169.128 root@kali:~# nmap -sn 192.168.169.128-20 To
ScanRange of IP root@kali:~# nmap -sn 192.168.169.* Wildcard root@kali:~# nmap -sn
192.168.169.128/24 Entire Subnet
Whois Information
To obtain Whois information and name server of a webiste
1. http://whois.domaintools.com/
2. https://whois.icann.org/en
Traceroute
Network Diagonastic tool that displays route path and transit delay in packets
2.PORT SCANNING
Perform port scanning using tools such as Nmap, Hping3, Netscan tools, Network monitor.
These tools help us to probe a server or host on the target network for open ports.
Open ports are the gateway for attackers to enter in and to install malicious backdoor
applications.
1. http://www.yougetsignal.com/
2. https://pentest-tools.com/information-gathering/find-subdomains-of-domain
1. https://www.netcraft.com/
2. https://w3dt.net/tools/httprecon
3. https://www.shodan.io/
These tools help us in finding vulnerabilities with the target system and operating systems.With
this steps, you can find loopholes in the target network system.
GFILanguard
It acts as a security consultant and offers patch Management, Vulnerability assessment, and
network auditing services.
Nessus
Nessus a vulnerability scanner tool that searches bug in the software and finds a specific way to
violate the security of a software product.
Data gathering.
Host identification.
Port scan.
Plug-in selection.
Reporting of data.
5.Draw Network Diagrams
Draw a network diagram about the organization that helps you to understand logical connection
path to the target host in the network.
The network diagram can be drawn by LANmanager, LANstate, Friendly pinger, Network
view.
6.Prepare Proxies
Proxies act as an intermediary between two networking devices. A proxy can protect the local
network from outside access.
With proxy servers, we can anonymize web browsing and filter unwanted contents such as ads
and many other.
Proxies such as Proxifier, SSL Proxy, Proxy Finder..etc, to hide yourself from being caught.
This document will help you in finding potential vulnerabilities in your network. Once you
determine the Vulnerabilities you can plan counteractions accordingly.
Thus, penetration testing helps in assessing your network before it gets into real trouble that may
cause severe loss in terms of value and finance.
Reconnaisance
Smartwhois, MxToolbox, CentralOps, dnsstuff, nslookup, DIG, netcraft
Discovery
Angry IP scanner, Colasoft ping tool, nmap, Maltego, NetResident,LanSurveyor, OpManager
Port Scanning
Nmap, Megaping, Hping3, Netscan tools pro, Advanced port scannerService Fingerprinting
Xprobe, nmap, zenmap
Enumeration
Superscan, Netbios enumerator, Snmpcheck, onesixtyone, Jxplorer, Hyena,DumpSec,
WinFingerprint, Ps Tools, NsAuditor, Enum4Linux, nslookup, Netscan
Scanning
Nessus, GFI Languard, Retina,SAINT, Nexpose
Password Cracking
Ncrack, Cain & Abel, LC5, Ophcrack, pwdump7, fgdump, John The Ripper,Rainbow Crack
Sniffing
Wireshark, Ettercap, Capsa Network Analyzer
MiTM Attacks
Cain & Abel, Ettercap
Exploitation
Metasploit, Core Impact
These are the Most important checklist you should concentrate with Network penetration
Testing .
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you
can take the Best Cybersecurity courses online to keep your self-updated.
Also Read:
Penetration testing Android Application checklist
Penetration testing with your WordPress website
Advanced ATM penetration testing methods
Web Server Penetration Testing Checklist