INDEX
299
for open X11 servers, 54–56
overview, 36–37
phase of PTES, 3
using results in Autopwn tool, 56
for valid SMB logins, 51–52
vulnerable services, identifying, 259–260
W
WEBATTACK_EMAIL
flag
OFF
option, 136
ON
option, 136, 142
web attack vectors, 142
client-side web exploits, 146–148
Java applet attack, 142–146
man-left-in-the-middle attack, 150
multi-attack vector, 153–157
tabnabbing attack, 150
username and password harvesting,
148–150
web jacking attack, 151–152, 153154
WebDAV, 127–128
webdav_scanner
module, 125
web jacking attack, 151–152, 153–154
Web Jacking Attack Method
option, SET
main menu, 151, 154
web server, configuring on
Windows XP, 269
Website Attack Vectors
option, SET
main menu, 144, 147, 149
website clone, 148–149, 152
Weidenhamer, Andrew, 163
Werth, Thomas, 142
White, Scott, 163
white hat test, 4
whois
lookups, 16–17
WIDEOPENWEST
service provider, 17
Win2k8, 282
Windows, Task Manager, 117
Windows APIs, manipulating with
Railgun add-on, 97
Windows authentication, MSSQL
Bruter, 168
Windows Components Wizard, 269
Windows debug 64KB restriction, 172
Windows Firewall, Windows XP, 269
Windows login credentials, 46
Windows Management Interface
(WMI), 269
Windows UAC, 248, 249, 283
Windows virtual machine, scanning, 21
Windows XP, 76–82
attacking MS SQL, 76–78
brute forcing MS SQL server, 78–79
exploitation for, 64–68
nmap
scan against, 19
scanning for ports with
nmap
, 76
scanning only one system, 27
as target machine, 269–274
configuring web server on, 269
creating vulnerable web applica-
tion, 271–272
MS SQL server on, 269–271
updating Back|Track, 272–274
xp_cmdshell, 79–80
windows/meterpreter/reverse_tcp
payload, 246
windows/shell_reverse_tcp
payload, 100
windows/smb/ms08_067_netapi
exploit,
59, 67
windows/smb/psexec
module, 84–85
wireless attack vector, 160–161
wireless card, 179
WMI (Windows Management
Interface), 269
WScript file, 157
WSCRIPT HTTP GET MSF Payload
option,
SET main menu, 158
X
X11 servers, vulnerability scanning for,
54–56
x86/shikata_ga_nai
encoder, 13, 103
x90
, Intel x86 architecture, 112
xCCs
breakpoints, 208
xp_cmdshell
stored procedure, 79–80,
166, 169, 172, 186, 187, 188,
255, 257
xspy
tool, 55–56
XSS (cross-site scripting)
vulnerability, 150
xterm
window, 256
Z
Zate, 49
zero-day vulnerability, Adobe Flash,
110, 146