How to test scanning for weaknesses on real machines
Keleis Andre 2 months ago

How to test scanning for weaknesses on real machines

As a security professional, you need to know how attackers will use system flaws to get into your company's network without permission. Hacking techniques are best learned by doing them yourself. This method gives a deep understanding of how networked computer systems work and how to best protect them from attack.

How to practice vulnerability scanning against real machines

As a security professional, you need to know how attackers will use system flaws to get into your company's network without permission. Hacking techniques are best learned by doing them yourself. This method gives a deep understanding of how networked computer systems work and how to best protect them from attack.

But how can you "practice" break into real systems without risking real damage to someone else's property and possible consequences for your career? The last thing you want is for your learning activities to be mistaken for black-hat hacking or to cause a good organization to lose real data.


A Safe Place to Learn How to Hack Ethically


Good hackers, on the other hand, can use a library of downloadable virtual machines that are ready to be attacked and are completely safe from these risks. The idea is simple: you run your copy of a virtual machine that has some holes and then use your knowledge and tools to try to get root access. At VulnHub, you can find a list of these kinds of machines.

 

How to practice vulnerability scanning against real machines

Who is VulnHub for?

The stated goal of VulnHub is to "provide materials that allow anyone to gain practical hands-on experience in digital security, computer software, and network administration." They do this by letting people download free virtual machines that have one or more known security holes that could be used by an attacker.


One of the virtual machines you can download from VulnHub.


When you download and run a virtual machine from VulnHub on your VMWare or VirtualBox host, it becomes a "black box" that you can test and probe. Machines are made to be vulnerable, and there are different levels of difficulty, so there is something for everyone, no matter how much you know about penetration testing. Your goal is to find the weakness and take advantage of it to get root access.


Levels of Difficulty


VulnHub gives them different levels of difficulty, from "very easy" to "very hard," based on the kinds of attacks that would have to be used to get root access:


Very Simple


Types of vulnerability:


Brute force


For the machine to work, there is no need to figure out anything about the target Singe vector.

Software exploits where the code works right out of the box (without any changes). (SearchSploit/Metasploit-Framework, for example)


Injecting SQL


Most of the time, you don't need to raise your privileges because you're already the highest user (root access) when you first log in.


Easy


Types of vulnerability ("Very Easy" and the following):


Putting in a command

Additions to files

Hash-cracking Kernel exploits for increasing privileges

There isn't much information that needs to be found out about the target.

One exploits to get access in the first place, and another to get more privileges.


Medium


Types of vulnerability ("Very Easy + Easy" and the ones below):

Cross-site programming

Multiple vectors

Software flaws where the code needs to be changed in some way for it to work (e.g. SearchSploit)

How to be a system administrator

Escalation of privilege is needed.


You may need to use a few vulnerabilities to get root access (short-chain)


Hard

Types of vulnerability ("Very Easy, Easy, and Medium," plus the following):


Encryption Harden/Defend is turned on for the Operating System

There are no public software bugs.

Limits based on time-based challenges

To get initial and root access, you have to chain together several security flaws (long chain)


Very Hard


Vulnerability types (including "Very Easy," "Easy," "Medium," and "Hard"):


The Mystery


To get initial and root access, you have to link together a series of vulnerabilities in different ways.


Are you ready to learn more about hacking in a good way?


The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard is a great book to read if you want to learn more about ethical hacking techniques that you can use against the machines on VulnHub. You can quickly get good at ethical hacking by using the techniques described in this book on the machines on VulnHub.

How to test scanning for weaknesses on real machines
How do employees' emails get tracked with Gmail?

How do employees' emails get tracked with Gmail?

1645391179.jpg
Keleis Andre
2 months ago
One of these five methods can quickly hack your Facebook account

One of these five methods can quickly hack your Facebook account

1645391179.jpg
Keleis Andre
7 months ago
Are there any real free WhatsApp tracker apps out there? Snoopza reviews

Are there any real free WhatsApp tracker apps out there? Snoopza revie...

1645391179.jpg
Keleis Andre
7 months ago
THC-O and HHC: How are they Different? 2022

THC-O and HHC: How are they Different? 2022

1645391179.jpg
Keleis Andre
3 months ago
You can keep an eye on where your child is and what they are doing online

You can keep an eye on where your child is and what they are doing onl...

1645391179.jpg
Keleis Andre
3 months ago