ISSAF was used in conjuction with the latest backtrack release.
Although it is not my company's standard it is quite close.
Not to be too open.. but this has lead to a really good idea for object orient coding.
Information Systems Security Assessment Framework (ISSAF) draft 0.2
ASSESSMENT
INFORMATION GATHERING
-Archive
-DNS
-Route
-SMTP
-Searchengine
-Survey
-Whois
NETWORK MAPPING
-Identify Live Hosts
-OS-Fingerprinting
-Portscanning
-Service Fingerprinting
-Identify Border Assets
-(SNMP - MIB Browsing)
-(VPN)
-Web/Public Application Mapping(Crawling)
VULNERABILITY IDENTIFICATION
-(Cisco)
-Database
-Fuzzers
-SMB Analysis
-SNMP Analysis
-Security Scanner
-Web Analysis
PENETRATION
-Exploits (metasploit)
-Exploits (CoreImpact / Canvas)
-Exploits (milworm /secfocus)
GAINING ACCESS AND PRIVILEGE ESCALATION
-Password Attacks
-Default Conf Attacks
-Sniffers
-Spoofing
ENUMERATING FURTHER
-Management Infrastructure (ie. WMI,SNMP,CDP)
-Pull Passwords (hashes, SAM FILES)
-Priviledged Assessment(Repeat all Steps)
COMPROMISE REMOTE USERS/SITES
-Targeted Phishing
-DNS Poisoning
MAINTAINING ACCESS
-Covert Channels
-Rootkits
-Portknocking
-Proxy
-Tunnels
COVER THE TRACKS
-House Cleaning
20070315
Subscribe to:
Post Comments (Atom)
2 comments:
I know this is trivial but..simple config for Linux/Unix IP setup. (IE in use for LiveCD's)
----
dhcpcd
or pumpd
----
ifconfig eth0 down
ifconfig eth0 10.1.1.10 netmask 255.255.255.0
route add default gateway 10.1.1.2
echo “nameserver 10.1.1.5” >> /etc/resolv.conf
ipconfig eth0 up
Nice Blog.
Post a Comment