Ethical Hacking and Penetration Testing Guide


Example 2: Finding Cisco IOS Requiring No Authentication



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə63/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   59   60   61   62   63   64   65   66   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Example 2: Finding Cisco IOS Requiring No Authentication
In this example, we will use Shodan to find out Cisco devices exposed to the Internet that require 
no authentication. The Cisco IOS that has a “200 OK” response with the “Last-Modified” header 
does not require authentication. We can use the filter “cisco-ios” “last-modified” to search for all 
the Cisco devices requiring no authentication. The Shodan HQ currently has more than 13,000 
results, meaning that more than 13,000 Cisco IOS devices do not require authentication


Information Gathering Techniques
◾ 
95
Example 3: Default Passwords
Next, we will use Shodan to search for websites that have a “default-passwords” keyword in their 
banners. The banners would most likely disclose the default passwords. We will use the filter 
“default password” to accomplish our goal.
As we can see, the server uses “default-password” “1234” to authenticate users. Furthermore, 
Shodan can be used to search for VLAN IDs, SNMP community strings, and security cameras.
Further Reading

https://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-
Schearer-SHODAN.pdf

http://www.slideshare.net/qqlan/icsscadaplc-googleshodanhq-cheat-sheet
Conclusion
We discussed various methods of active and passive reconnaissance and some real-world informa-
tion gathering techniques. Reconnaissance is the most essential phase of penetration testing. The 
better you do it, the more successful you will be in the later phases.



97
Chapter 4
Target Enumeration and 
Port Scanning Techniques
In this chapter we will discuss various methods for enumerating and scanning a target or goal to 
gain as much information about the alive targets on a network as possible. This is also part of the 
information gathering phase, which, as I had mentioned, is key to a successful pentest. This chap-
ter is very essential and is a building block for penetration testers, because later in Chapter 7 you 
will realize how the information we have gathered in this chapter helps us to compromise targets.
The main goal of this chapter is to learn the following:

Host discovery

Scanning for open ports

Service and version detection

OS detection

Bypassing firewalls
We will use a variety of tools in demonstrating these tasks.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   59   60   61   62   63   64   65   66   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin