Ptva Report 222
Ptva Report 222
Ptva Report 222
Submitted by
Dr. B. BALAKIRUTHIGA
BACHELOR OF TECHNOLOGY
in
MAY 2024
TABLE OF CONTENTS
7. Red Team Exercises: Red team exercises simulate realistic attack scenarios
to evaluate the effectiveness of an organization's security defenses. Unlike
traditional penetration testing, red team exercises involve a more
comprehensive and prolonged engagement, often including multiple attack
vectors and techniques.
SOA - stores important information about a domain or zone such as the email
address of the administrator, when the domain was last updated, and how long the
server should wait between refreshes
● command to find info on start of authority of this NS
MX record - record directs email to a mail server. The MX record indicates how
email messages should be routed in accordance with the Simple Mail Transfer
Protocol (SMTP, the standard protocol for all email)
● ftp scan
● snmp scan using nmap
Xmas and ARP ASSIGNMENT
● NMAP -SX
The program can be used to find live hosts on a network, perform port
scanning, ping sweeps, OS detection, and version detection.
● NMAP -sF
● Nmap -sN
● Arp
● Arp -v
● Arp -a
● Arp -a
● Arp -v
Wireshark Assignment
MALTEGO
● Maltego is a powerful OSINT (Open Source Intelligence) tool used for
data mining and link analysis.
● Installation: It's available for Windows, Linux, and Mac OS. Users can
download and install it from the official website or use package managers
like apt or brew.
● Working: Maltego collects data from various sources like public
databases, social networks, and online resources. It visualizes this data
using graph- based representations.
● Uses:
➔ Investigating cyber threats by mapping relationships between entities
like IP addresses, domains, and email addresses.
➔ Gathering information for digital forensics and intelligence gathering.
➔ Conducting footprinting and reconnaissance during penetration
testing.
➔ Identifying patterns and connections in complex datasets for
intelligence analysis.
● Users can customize and extend Maltego's functionality through additional
transforms and integrations with external APIs and data sources.
● It's essential to use Maltego ethically and legally, respecting privacy and
data protection regulations.
CASE STUDY : Pentesting on Data
center
Phase 1: Reconnaissance :
1. Passive Reconnaissance:
Phase 2: Enumeration :
1. Service Enumeration:
● Exploiting the identified open ports, hackers use tools like Nessus or
OpenVAS to conduct service enumeration and detect potential
vulnerabilities.
● They identify outdated software versions, misconfigurations, and weak
security controls that could be exploited.
2. User Enumeration:
Phase 3: Exploitation :
1. Vulnerability Exploitation:
3. Password Attacks:
● Using tools like Hydra or John the Ripper, hackers launch password
guessing attacks against login interfaces, VPN gateways, or remote
access services.
● They attempt to brute-force weak passwords or crack hashed
passwords obtained from reconnaissance activities.
Phase 4: Post-Exploitation :
1. Privilege Escalation:
● Once initial access is gained, hackers escalate their privileges within the
network by exploiting misconfigurations or vulnerabilities in operating
systems and applications.
● They exploit weaknesses in access control mechanisms or insecure
default configurations to gain administrative privileges.
2. Lateral Movement:
1. Data Theft:
1. Phishing:
2. Pretexting:
3. Baiting:
6. Dumpster Diving: