Most Important Network Penetration Testing Checklist

https://gbhackers.com/network-penetration-testing-checklist-examples/

Lets see how we carry out an action by action Network penetration screening by utilizing some popular network scanners.

Network Penetration Testing determines vulnerabilities in the network posture by finding Open ports, Repairing live systems, services and getting system banners.

The pen-testing helps administrator to close unused ports, extra services, Hide or Customize banners, Troubleshooting services and to adjust firewall program rules.You must test in all ways to ensure there is no security loophole.

1. HOST DISCOVERY

PTR– Reverse DNS lookup, with the assistance of IP you can get domains associated with it.

CNAME– Cname record maps a domain to another domain name.

DNS footprinting assists to identify DNS records like (A, MX, NS, SRV, PTR, SOA, CNAME) solving to the target domain.

SOA– Start of record, it is absolutely nothing but the info in the DNS system about DNS Zone and other DNS records.

A– A record is utilized to point the domain name such as gbhackers.com to the IP address of its hosting server.
MX– Records accountable for Email exchange.

We can detect live hosts, accessible hosts in the target network by using network scanning tools such as Advanced IP scanner, NMAP, HPING3, NESSUS.

Footprinting is the important and first phase were one gather info about their target system.

SRV– Records to distinguish the service hosted on particular servers.

NS– NS records are to determine DNS servers responsible for the domain.

Ping&& Ping Sweep:

:

email secured:

# whois testdomain.com.

Whois Information.

# nmap -sn 192.168.169.128/ 24 Entire Subnet

To get Whois information and name server of a webiste.

# nmap -sn 192.168.169. * Wildcard

Traceroute.

http://whois.domaintools.com/.
https://whois.icann.org/en.

Network Diagonastic tool that shows route path and transit delay in packages.

:

Online Tools.

http://www.monitis.com/traceroute/.
http://ping.eu/traceroute/.

2. PORT SCANNING.

Open ports are the entrance for aggressors to go into in and to install destructive backdoor applications.

Carry out port scanning utilizing tools such as Nmap, Hping3, Netscan tools, Network screen. These tools help us to penetrate a server or host on the target network for open ports.

# nmap -p 80-200 192.168.169.128 Range of ports.

# nmap -p 80 192.168.169.128 Specific Port.

:

http://www.yougetsignal.com/.
https://pentest-tools.com/information-gathering/find-subdomains-of-domain.

Online Tools.

3. Banner Grabbing/OS Fingerprinting.

Once you know the version and os of the target, we require to find the vulnerabilities and exploit.Try to acquire control over the system.

Perform banner Grabbing/OS fingerprinting such as Telnet, IDServe, NMAP identifies the os of the target host and the os.

email secured:

https://www.netcraft.com/.
https://w3dt.net/tools/httprecon.
https://www.shodan.io/.

Online Tools.

IDserve another good tool for Banner Grabbing.

# nmap -v -A 192.168.169.128 with high verbosity level.

4. Scan for Vulnerabilities.

GFILanguard.

Data collecting.
Host identification.
Port scan.
Plug-in selection.
Reporting of data.

It serves as a security expert and uses patch Management, Vulnerability evaluation, and network auditing services.

Nessus.

Scan the network utilizing Vulnerabilities using GIFLanguard, Nessus, Ratina CS, SAINT.

These tools help us in finding vulnerabilities with the target system and operating systems.With this steps, you can discover loopholes in the target network system.

Nessus a vulnerability scanner tool that browses bug in the software and finds a specific method to break the security of a software.

5. Draw Network Diagrams.

Draw a network diagram about the company that assists you to understand logical connection course to the target host in the network.

The network diagram can be drawn by LANmanager, LANstate, Friendly pinger, Network view.

6. Prepare Proxies.

Proxies function as an intermediary between 2 networking devices. A proxy can protect the regional network from outdoors gain access to.

Proxies such as Proxifier, SSL Proxy, Proxy Finder. and so on, to hide yourself from being caught.

With proxy servers, we can anonymize web browsing and filter undesirable contents such as ads and lots of other.

6. File all Findings.

Hence, penetration screening assists in examining your network prior to it enters into real difficulty that might cause extreme loss in terms of worth and financing.

Port Scanning.

# nmap -p 80-200 192.168.169.128 Range of ports.

MiTM Attacks.

Discovery.

Metasploit, Core Impact.

Scanning.

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity updates likewise you can take the Best Cybersecurity courses online to keep your self-updated.

The last and the really crucial step is to document all the Findings from Penetration testing.

This document will help you in discovering possible vulnerabilities in your network. When you figure out the Vulnerabilities you can prepare counteractions accordingly.

Likewise Read:.

Password Cracking.

Structures.

Enumeration.

# nmap -p “*” 192.168.169.128 To scan all ports.

Crucial Tools utilized for Network Pentesting.

Superscan, Netbios enumerator, Snmpcheck, onesixtyone, Jxplorer, Hyena, DumpSec, WinFingerprint, Ps Tools, NsAuditor, Enum4Linux, nslookup, Netscan.

Exploitation.

These are the Most crucial checklist you must focus with Network penetration Testing.

Angry IP scanner, Colasoft ping tool, nmap, Maltego, NetResident, LanSurveyor, OpManager.

# nmap -p 80 192.168.169.128 Specific Port.

Wireshark, Ettercap, Capsa Network Analyzer.

Smelling.

Ncrack, Cain & & Abel, LC5, Ophcrack, pwdump7, fgdump, John The Ripper, Rainbow Crack.

# nmap -sn 192.168.169.128/ 24 Entire Subnet

Nmap, Megaping, Hping3, Netscan tools pro, Advanced port scannerService Fingerprinting Xprobe, nmap, zenmap.

You can download guidelines and scope Worksheet here– Rules and Scope sheet.

# nmap -sn 192.168.169.128

Reconnaisance.