Penetration Testing mailing list archives
Re: Corporate Intranet
From: Zack Payton <zpayton () gmail com>
Date: Thu, 30 Apr 2009 16:02:17 -0400
Yo, Use the recent DNS vuln on their resolving DNS server, overwrite the record for google.com with a webserver you control... load up activex or flash/java/script app that calls home and sets up some kind of proxy server or vpn tunnel back to you and use that to pwn all. Quick, easy, and efficient. Usually, you only get to pick two of the three. Z On Wed, Apr 29, 2009 at 4:27 AM, Aarón Mizrachi <unmanarc () gmail com> wrote:
On Lunes 27 Abril 2009 14:14:52 iadcc escribió:Has anybody done a penetration test, in trying to access a companies corporate intranet, from outside the Network? If so can you give me some pointers how you attempted to do so?Indeed. there are various vectors of attack. But, generally, try this scheme. 1. Try to map or figure out how is the network inside... There are too many ways to do that. First of all, you must know where are the public IP address of your company. If you are under blackbox, try using google and maltego to identify useful information about the company. Other method is sending a legitim request by email to a coorporative email, and wait for reply... On reply, you may found useful information. Next, scan external services and possible ip addresses, sometimes there are useful information and information leakage over ip external addresses. 2. When the map is done, do an exhaustive service scan and identification over all ip addresses involved, specially on routers. And If you found exploits on there (routers), all the work is done. If no success: 3. With the previous information, make a dictionary, and try bruteforce attacks on sensitive services (VPN, Router logins, whatever) 4. Try to exploit founded vulns (all depends on updates and configuration of every service). - On routers, many exploits involves download config, if you are lucky, you will found password there. Another option is create a VPN user or a route/nat entry. - On Webserver (or similar), if the webserver are shared on the intranet, you may try to get access on there. Then, you may redirect your connections to the intranet with a VPN (like openvpn) - On misconfigured proxies, a common mechanism are the "reverse proxy" method, remember that you need to know internal ip addresses notation or bruteforce it. - On internet browsers combined with Social Engineering, you could try to identify and exploit internet navigator bugs to put your reverse connection code inside the network. 5. If no success, you may try to use social engineering to put a trojan inside the network, then, redirect your connections over the trojan. Outgoing traffic usually can be bypassed with systems like IODINE, or OpenVPN using 443 port... To avoid IDS/IPS detection, you could use different ip addresses and delay timing policies. And finally, this is a scheme to do that, but never the definitive guide to external pentesting. All depends on internal configuration, updates, managment policies, and others. ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Corporate Intranet iadcc (Apr 27)
- RE: Corporate Intranet Michelli, Geoff (Apr 28)
- Re: Corporate Intranet Christian Eric Edjenguele (Apr 28)
- Re: Corporate Intranet Adriel T. Desautels (Apr 30)
- Re: Corporate Intranet Jeremy Brown (Apr 30)
- Re: Corporate Intranet Aarón Mizrachi (Apr 30)
- Re: Corporate Intranet Zack Payton (Apr 30)