Skip to content

Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and safe test environment

Notifications You must be signed in to change notification settings

Fincer/penetration-testing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

77 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Offensive penetration testing

NOTE: Some exercises in this repository include answers to HackTheBox penetration challenges. To respect accepted rules & terms of the HackTheBox website, spoiler information of hacking servers in their test network environment is not published in this repository. This policy will change only if the following conditions are met: 1) the particular computers are retired or offline. In any other circumstances, information of hacking HackTheBox-related computer servers is not published in this repository. Thank you.

The information in this repository will be re-evaluated later.


  • Aim of this repository is to present and simulate multiple attack types against web applications and various OSes, including Microsoft Windows

  • This repository

  • The repository is mainly set up as a requirement by a school cource in Haaga-Helia University of Applied Sciences, Helsinki, Finland.

  • The repository contains various exercises, currently presented in Finnish but will be translated into English later.

Table of Contents

Other contents


Iptables ruleset for a simple server

Iptables firewall ruleset featuring the following:

  1. Do not respond to ping echoes by clients (possibly reduce spambots)
  1. Reject connection if too intense attempts. Useful against port scanners such as Nmap and other brute force scanners such as Dirbuster.
  1. Drop all incoming connections, apply only SSH, HTTP and HTTPS

Fake Apache server HTTP response codes

  1. Server HTTP response codes in range 402-451 are returned as error code 400 response instead.
  1. Server HTTP response codes in range 500-511 are returned as error code 400 response instead.
  1. Server HTTP response codes in range 100-308 are returned normally, including 200 OK message.

NOTE: These are experimental patches for Apache HTTP web server, use with caution. Feel free to modify them! The server configuration can easily break because we break very deep standards here, just be aware and proceed with care! Thanks!

NOTE: This patchset is useful in some cases but it can bury underneath problems in server configuration. Thus, use discretion before implementing the patches in your Apache server.

NOTE: Apache will complain about missing error codes after you have applied this patchset and if you have custom error redirections in your .htaccess or in other settings. This is why you need to adjust your custom ErrorDocument directives and equivalent settings (RewriteRules, for instance) in your VirtualHost/Page configuration file (/etc/{apache2,httpd}/sites-available/*.conf).


Find old package versions at high risk on Arch Linux using updated CVE data

[Bash script] archrisks.sh - Fincer/archtools

Check packages on your system and find out number of potential CVE issues and evaluate generic risk of an outdated package on your Arch Linux system. Does not give detailed information, just a basic summary. Do further analysis for any package if needed on Arch security database and using regular CVE databases

  • Requires Arch Linux (core dependencies are: pacman and arch-audit, bc and bash version 4 or higher)

  • Simple bash shell script

  • CVE security information from Arch security database

  • NOTE sudo is required for package database updates retrieved by pacman. If in doubt, you can always check the script yourself (link here).


Disclaimer

Author of this repository is not responsible for any possible illegal or malicious usage of any files or instructions provided by this repository. The repository is provided as an act of good will and does not intend to encourage users to participate in any illegal activities. All exercises presented in this repository have been carried out in a pre-configured test environment, minimizing any possible attack vectors or unintended harm to outside parties.

About

Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and safe test environment

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages