Professional Documents
Culture Documents
Internal PT Checklist
Internal PT Checklist
Check
1 Map the internal network
2 Scan the network for live hosts
3 Open ports-reporting
4 Nessus -scan
5 Attempt to establish null sessions
Enumerate users/identify domains on
6 the network
7 Sniff the network using Wireshark
Sniff POP3/FTP/telnet passwords/ Email
8 messages/
9 DNS poisoning
Boot the PC using an alternate OS and
10 steal the SAM file
11 Attempt to Bypass AV- install keylogger
Hide hacking tools and other data on
12 target machines
13 Escalate user privileges
14 Capture Protocols
Remarks
Tools
Manual
Live hosts
UDP, TCP ports
Identify Vulnerbilities
Null session test
Advanced IP scanner
Nmap, Nessus
Nessus
SMB enum, NMAP
Nmap, Nessus
host file
Password crack
obtain password, and AV
strength
Make File and folder can't
be deleted
Unauthorised access, SMB
enumeration
Kali-live
-ip.src == ip_address,
-ip.dst == ip_address,
-tcp.dstport == port_no,
-ip.addr == ip_address
violate firewall/domain
policy
TOR/Web proxy
Windows NT session
Reporting
Wireshark
Metasploit-scripts
Stealth Folder Hider:
Metasploits
Wireshark/ Tcpdump
Wireshark
ifconfig
TOR browser, proxychain
Cain & Abel/ Cookie
manager/ Beef
Collecting Evidence
Test- Status