Posts

Beginner’s guide: OSSIM Part 2

Image
Hope all of you are keeping well. Thank you all for the overwhelming support you people are giving me. So today we’ll deal with everything from basic OSSIM configuration to integrating different types of assets. Before we jump in to all of that I hope all of you are ready with installation. If not please visit my previous post, which is actually the first part. Beginner’s guide: OSSIM (Open Source Security Information Management) part 1 Make sure you have an active internet connection for your OSSIM. As you all know the Alienvault platform has five modules in it, which are the Asset discovery, vulnerability assessment, threat detection, behavioural monitoring and security intelligence. In simple words we add assets first, and then we’ll configure all those assets under each and every module of Alienvault respectively. If you're ready with everything mentioned in part 1, we can now move forward with the configurations. Here we’re just considering only OSSIM not USM....

Nmaping your network

Image
A short tutorial for using NMAP   I hear a lots of questions like, how do we scope assets, or how do I manage my asset inventory. Well the answer is NMAP. Nmap is a quite handy tool, that'll allow you to map ip address with assets, create an asset inventory, or even  a small vulnerability scans. Here we'll talk about how to run an nmap full scan, nmap all port scan or nmap specific port scan For all those newbies out there, I’m just starting from scratch. As you all know NMAP means network mapping. This is a small tool which every pentester and network/system administrator must know. Most of my friends complain that Nmap is so vast; they don’t know how to set or why to set certain attributes before initiating a scan. To understand the working of Nmap properly, you need to how a system works in network. I’m not planning to go into core basics, but we’ll touch whatever is essential.

Scanning and Enumeration

Scanning Assets After the initial reconnaissance, a pentester identifies the target system, as discussed before the pentester concentrates on getting a mode of entry into the target system. The scanning phase can not be limited to intrusion alone. It can be extended form of reconnaissance where the pentester learns more about target, like what operating system is being used, what services  are being run on the systems, and any configuration lapses if any of it can be identified. The pentester can then strategize his/her attack, factoring in these aspects. Footprinting is the first phase of pentesting, in which the pentester gains information about the target, passively or actively. Footprinting alone is not enough for pentesting because it will only give the pentester an overview or primary information about the target. The pentester can use this primary information in the next phase to gather even more in-depth details about the target. This process of gathering in-d...

Most commonly found Trojan Ports

If you see any of these ports open, then you should double check if it is really a Trojan or not. Trojans basically provide "Remote access" to it's command and control center TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 Coma.109 TCP 420 Breach.450 TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100 TCP 623 Rtb666.160 TCP 660 Zaratustra.100

Passive Information Gathering

Passive Information gathering refers to the process of collecting information about a target network and its environment by passive methods.   The entire “information gathering ” is considered as a ״ methodological ” procedure, because those critical information gathered, is categorized based on a previous discovery. The Idea of information gathering is have an entire blueprint of the network infrastructure of the target organization. The blueprints will be probably unique for each and every branch. Passive information gathering is completely harmless to the target organization since we do not directly engage with the target organization. Technically speaking, we have four intention while performing information gathering 1. Collect all available information, passively and actively about the target and its network 2. Identify the operating system, platforms, web server versions, etc. 3. Perform techniques such as Whois llokup, DNS fingerprinting, other network and org...

Foot printing and Reconnaissance

Image
The very first phase of pentesting is Foot printing and reconnaissance. The idea is to develop a picture of our client before performing a test. Generally speaking foot printing and reconnaissance is only done for black box pentesting. But even if we are performing white or gray box testing, we’ll plot an idea about where to start and how to start the test. Specifically in white box testing, if we need some clarification with a few of the points given by the clients then, definitely we ask for them to clear it for us. In black box testing we identify whether any information is leaked to internet unknowingly by the client. Hence black box testing is the best way for security assessment, since it gives full picture about what information is disclosed. For a malicious hacker any information that is readily available on internet is useful to him. Before we jump into the technical we need to know a few basic terms used in information gathering. These terms helps to understand t...

How to setup Kali Linux in VM

Image
Kali linux is one of the most commonly used penetration testing distros, which is one of the commonly user tiger boxes, among pentesters. It is mostly used tools for penetration testing, cyber forensics and malware analysis. I hope you've already downloaded you matching version of Kali Linux. If not please download from the following link  https://www.kali.org/downloads/ Before we start, it is always best do review on the basics of virtualization. Please go through the following link before proceeding http://pentesterblogs.blogspot.in/2016/07/pentest-lab.html   At the time when I'm writing this blog Kali Linux has stable release "rolling".

How to virtualize using vmware

Image
Today we’ll build or technically speaking “virtualize” our demo labs. Most of the intentionally vulnerable applications which we see in internet are in a specific format known as “ ova (open virtualization archive)” or “ ov f (open virtualization format)”, which you can directly import without any issues. Before we start building a virtual machine we need to know some essential basics. The real machine in which you’ve have installed virtualization software is called as host / physical machine. And the virtual machine running inside host machine is known as guest / virtual machines