<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Fawazkh80</title>
    <description>The latest articles on DEV Community by Fawazkh80 (@fawazkh80).</description>
    <link>https://dev.to/fawazkh80</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1111522%2F0e0967c1-8b24-4b98-82d0-e1057231a89a.png</url>
      <title>DEV Community: Fawazkh80</title>
      <link>https://dev.to/fawazkh80</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/fawazkh80"/>
    <language>en</language>
    <item>
      <title># Demystifying AWS EC2 Network Interface Cards</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Mon, 18 Sep 2023 08:02:41 +0000</pubDate>
      <link>https://dev.to/fawazkh80/-demystifying-aws-ec2-network-interface-cards-28no</link>
      <guid>https://dev.to/fawazkh80/-demystifying-aws-ec2-network-interface-cards-28no</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Amazon Web Services (AWS) offers a wide range of services to meet the diverse needs of its users. Amazon Elastic Compute Cloud (EC2) instances are a fundamental component of AWS, serving as virtual servers that can be customized to suit various workloads. When working with EC2 instances, it's crucial to understand the different types of Network Interface Cards (NICs) available, as they play a pivotal role in networking and communication within the AWS cloud environment. In this article, we'll explore the three primary types of NICs used in AWS EC2 instances: Elastic Network Interface (ENI), Elastic Network Adapter (ENA), Elastic Fabric Adapter (EFA), and the Elastic Network (EN).&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Elastic Network Interface (ENI)
&lt;/h3&gt;

&lt;p&gt;Elastic Network Interfaces (ENIs) are fundamental to AWS networking. Each EC2 instance can have one or more ENIs attached to it. ENIs serve as virtual network cards, allowing instances to communicate with other AWS resources and the internet. They come with a set of attributes, such as a private IP address, a MAC address, and security group rules, which enable fine-grained control over network traffic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of ENI:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ENIs are used for basic networking functionality within EC2 instances.&lt;/li&gt;
&lt;li&gt;They support both IPv4 and IPv6 addresses.&lt;/li&gt;
&lt;li&gt;ENIs can be moved between instances within the same Availability Zone (AZ).&lt;/li&gt;
&lt;li&gt;They are essential for creating High Availability (HA) architectures and multi-tier applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Elastic Network Adapter (ENA)
&lt;/h3&gt;

&lt;p&gt;Elastic Network Adapters (ENAs) are hardware-accelerated NICs designed for enhanced network performance in AWS EC2 instances. ENAs are optimized for modern networking protocols and support features like jumbo frames and increased packet per second (PPS) performance. They are particularly beneficial for workloads that require high network throughput, such as big data processing and high-performance computing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of ENA:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ENAs offer significantly improved network performance over standard ENIs.&lt;/li&gt;
&lt;li&gt;They support features like Enhanced Networking, which allows for higher PPS and lower latency.&lt;/li&gt;
&lt;li&gt;ENAs are required for specific instance types, and they are automatically enabled when using these instances.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Elastic Fabric Adapter (EFA)
&lt;/h3&gt;

&lt;p&gt;Elastic Fabric Adapters (EFAs) are specialized NICs designed for high-performance computing (HPC) workloads, machine learning, and other demanding applications. EFAs provide low-latency, high-bandwidth communication between instances within a Placement Group, allowing for tight coupling and efficient data transfer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of EFA:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EFAs deliver the lowest network latency and highest bandwidth performance among AWS NICs.&lt;/li&gt;
&lt;li&gt;They are specifically designed for HPC and ML workloads.&lt;/li&gt;
&lt;li&gt;EFAs require instances that support them and a Placement Group configuration for optimal performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Elastic Network (EN)
&lt;/h3&gt;

&lt;p&gt;The Elastic Network (EN) is a virtual networking service introduced by AWS. It is not a traditional NIC like ENI, ENA, or EFA. Instead, EN is a managed, global network that connects VPCs and on-premises data centers. It provides advanced networking features such as Global Accelerator, Transit Gateway, and Direct Connect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of EN:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EN enables global networking and connects multiple VPCs and on-premises environments.&lt;/li&gt;
&lt;li&gt;It offers features like low-latency global load balancing through Global Accelerator.&lt;/li&gt;
&lt;li&gt;EN simplifies the network architecture and improves connectivity across different regions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Differences Between ENI, ENA, EFA, and EN:
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use Cases:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ENI: General-purpose networking within EC2 instances.&lt;/li&gt;
&lt;li&gt;ENA: Enhanced networking for improved performance in various workloads.&lt;/li&gt;
&lt;li&gt;EFA: High-performance networking for HPC and ML applications.&lt;/li&gt;
&lt;li&gt;EN: Global networking for connecting VPCs and on-premises environments.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Performance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ENI: Basic networking performance.&lt;/li&gt;
&lt;li&gt;ENA: Enhanced performance with support for modern networking protocols.&lt;/li&gt;
&lt;li&gt;EFA: Highest performance with low-latency, high bandwidth.&lt;/li&gt;
&lt;li&gt;EN: Provides advanced networking features rather than direct instance networking.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Instance Compatibility:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ENI: Compatible with most EC2 instances.&lt;/li&gt;
&lt;li&gt;ENA: Requires specific ENA-enabled instance types.&lt;/li&gt;
&lt;li&gt;EFA: Requires specific EFA-enabled instance types and Placement Groups.&lt;/li&gt;
&lt;li&gt;EN: Not tied to specific instances, used for global networking.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;[reference: &lt;a href="https://varunmanik1.medium.com/aws-eni-vs-en-vs-efa-22250513590f"&gt;https://varunmanik1.medium.com/aws-eni-vs-en-vs-efa-22250513590f&lt;/a&gt; ]&lt;/em&gt; &lt;/p&gt;

</description>
    </item>
    <item>
      <title>Post-Exploitation Phase</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Sun, 10 Sep 2023 16:27:33 +0000</pubDate>
      <link>https://dev.to/fawazkh80/-post-exploitation-phase-ggg</link>
      <guid>https://dev.to/fawazkh80/-post-exploitation-phase-ggg</guid>
      <description>&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;p&gt;While the initial stages of a penetration test focus on gaining access to a target system, the post-exploitation phase is equally critical. In this phase, ethical hackers shift their focus towards maintaining access, gathering sensitive information, and ensuring that their presence remains undetected.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-Exploitation Methods
&lt;/h2&gt;

&lt;p&gt;During the post-exploitation phase, ethical hackers employ various methods to achieve their objectives:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Privilege Escalation
&lt;/h3&gt;

&lt;p&gt;Privilege escalation is the process of gaining higher-level access or permissions on a compromised system. This often involves exploiting vulnerabilities in the operating system or applications to escalate from a low-privileged user to a privileged user or administrator.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Lateral Movement
&lt;/h3&gt;

&lt;p&gt;Lateral movement refers to the ability to move laterally within a network, potentially compromising multiple systems. Ethical hackers use this method to explore and compromise additional systems and gather more data.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Data Exfiltration
&lt;/h3&gt;

&lt;p&gt;Data exfiltration involves stealing sensitive information from the compromised system. This can include customer data, intellectual property, or any valuable information that the organization wants to protect.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Persistence
&lt;/h3&gt;

&lt;p&gt;Maintaining access to a compromised system is crucial for ethical hackers. Persistence methods ensure that even if the initial breach is discovered and patched, they can still regain access.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Tools in Post-Exploitation
&lt;/h2&gt;

&lt;p&gt;To execute these post-exploitation methods effectively, ethical hackers rely on a range of specialized tools. Some commonly used tools include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Metasploit&lt;/strong&gt;: A versatile penetration testing framework that provides various modules and payloads for post-exploitation activities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;PowerShell Empire&lt;/strong&gt;: A post-exploitation framework that leverages PowerShell to execute commands on compromised systems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cobalt Strike&lt;/strong&gt;: A popular tool for red teaming and penetration testing, offering features for post-exploitation, lateral movement, and persistence.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mimikatz&lt;/strong&gt;: A powerful tool for extracting plaintext passwords, hashes, and Kerberos tickets from memory.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;[Disclaimer: This article is for educational purposes only. Unauthorized penetration testing is illegal and unethical. Always obtain proper authorization before conducting any penetration testing activities.]&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Exploitation phase</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Thu, 13 Jul 2023 22:37:13 +0000</pubDate>
      <link>https://dev.to/fawazkh80/exploitation-phase-in-pentesting-5cp9</link>
      <guid>https://dev.to/fawazkh80/exploitation-phase-in-pentesting-5cp9</guid>
      <description>&lt;h1&gt;
  
  
  Overview
&lt;/h1&gt;

&lt;p&gt;The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It helps to determine the severity of the vulnerabilities identified in the previous phase.&lt;/li&gt;
&lt;li&gt;It helps to identify the impact of the vulnerabilities on the system.&lt;/li&gt;
&lt;li&gt;It helps to identify the level of access that an attacker can gain on the system.&lt;/li&gt;
&lt;li&gt;It helps to identify the countermeasures that can be taken to prevent the exploitation of vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Famous Exploits
&lt;/h1&gt;

&lt;p&gt;There are several famous exploits that can be used in the exploitation phase, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Eternal Blue&lt;/strong&gt;: It is an exploit for a vulnerability in Microsoft's Server Message Block (SMB) protocol. It was used in the WannaCry ransomware attack in 2017.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Log4j&lt;/strong&gt;: It is a vulnerability in the Apache Logging Services Project's Log4j library that allows an attacker to execute arbitrary code.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BlueKeep&lt;/strong&gt;: It is a vulnerability in Microsoft's Remote Desktop Protocol (RDP) that allows an attacker to execute arbitrary code.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Most Commonly Used Tools
&lt;/h1&gt;

&lt;p&gt;There are several tools that can be used in the exploitation phase. Some of the most used tools and how to use them are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Nmap&lt;/strong&gt;: It is a tool used for network exploration and security auditing. To use Nmap, the tester needs to provide the IP address of the target system. Nmap will then scan the system and identify the open ports and services. This information can be used to identify vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Usage example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap &amp;lt;target IP address&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Metasploit Framework&lt;/strong&gt;: It is an open-source tool that provides a framework for developing and executing exploits. To use Metasploit, the tester needs to select an exploit from the list of available exploits and configure it. Once the exploit is configured, the tester can execute it and gain access to the system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Usage example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;use exploit/windows/smb/ms17_010_eternalblue
set RHOST &amp;lt;target IP address&amp;gt;
set PAYLOAD windows/x64/meterpreter/reverse_tcp
run
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;PsExec&lt;/strong&gt;: It is a tool used to execute commands on remote systems. To use PsExec, the tester needs to provide the username and password of a user with administrative privileges on the target system. The tester can then execute commands on the target system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Usage example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;psexec \\target -u &amp;lt;username&amp;gt; -p &amp;lt;password&amp;gt; cmd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h1&gt;
  
  
  Using Information Obtained in the Exploitation Phase
&lt;/h1&gt;

&lt;p&gt;Once the tester has gained access to the system and extracted sensitive information, the information obtained in the exploitation phase is used in the post-exploitation phase. The information obtained can be used to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify the security measures that need to be taken to prevent future attacks.&lt;/li&gt;
&lt;li&gt;Determine the extent of the damage caused by the attack.&lt;/li&gt;
&lt;li&gt;Identify the data that has been compromised.&lt;/li&gt;
&lt;li&gt;Gather additional information about the system for further exploitation.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;the exploitation phase is an important step in the penetration testing process. It helps to determine the severity of vulnerabilities, identify countermeasures, and gain access to the system. The most famous exploits and tools used in the exploitation phase were discussed, and examples of how to use them were provided. Finally, the information obtained in the exploitation phase is used in the post-exploitation phase to prevent future attacks and minimize damage caused by the attack.&lt;/p&gt;

&lt;h2&gt;
  
  
  Disclaimer
&lt;/h2&gt;

&lt;p&gt;The information provided in this article is for educational purposes only. The tools and techniques discussed in this article should only be used on systems with prior written consent from the owner or authorized personnel. Any unauthorized use of these tools or techniques may result in legal consequences. The author of this article are not responsible for any damage or loss caused by the use of the information provided in this article. It is the responsibility of the reader to use this information ethically and responsibly.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Vulnerability Scanning</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Sat, 01 Jul 2023 16:18:25 +0000</pubDate>
      <link>https://dev.to/fawazkh80/vulnerability-scanning-49i1</link>
      <guid>https://dev.to/fawazkh80/vulnerability-scanning-49i1</guid>
      <description>&lt;p&gt;Vulnerability scanning is a critical phase in the penetration testing process, where the primary goal is to identify potential vulnerabilities and weaknesses in the target system or application. The purpose of this phase is to determine the attack surface and assess the severity of the identified vulnerabilities to determine the best approach for exploitation. In this article, we will discuss vulnerability scanning and its importance in the penetration testing process, as well as the most commonly used tools.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Vulnerability Scanning and Why We Use It
&lt;/h2&gt;

&lt;p&gt;Vulnerability scanning is the process of identifying potential weaknesses and vulnerabilities in the target system or application. This phase involves using automated tools to scan the target system or application for known vulnerabilities and misconfigurations.&lt;/p&gt;

&lt;p&gt;The primary goal of vulnerability scanning is to identify potential vulnerabilities that could be exploited by attackers to gain unauthorized access to the target system or application. By identifying and addressing these vulnerabilities, organizations can reduce the risk of a successful attack and improve their overall security posture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Most Commonly Used Tools
&lt;/h2&gt;

&lt;p&gt;There are several tools that can be used for vulnerability scanning, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Nessus&lt;/strong&gt;: Nessus is a popular vulnerability scanner that can be used to scan for known vulnerabilities in the target system or application. Nessus can be used for both network and web application scanning and includes a comprehensive database of known vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Metasploit&lt;/strong&gt;: Metasploit is a penetration testing framework that includes a vulnerability scanner. The Metasploit vulnerability scanner can be used to scan for known vulnerabilities in the target system or application and includes a comprehensive database of known vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Nmap&lt;/strong&gt;: Nmap is a network exploration and security auditing tool that can be used for vulnerability scanning. Nmap can be used to scan for open ports and services on the target system or application, which can be used to identify potential vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Using Vulnerability Scanning in the Exploitation Phase
&lt;/h2&gt;

&lt;p&gt;The information gathered during the vulnerability scanning phase can be used in the next phase of the penetration testing process, which is exploitation. The vulnerabilities identified during the vulnerability scanning phase can be used to develop and execute an attack plan.&lt;/p&gt;

&lt;p&gt;For example, if a vulnerability is identified in a web application, an attacker could use this vulnerability to gain unauthorized access to the target system or application. The attacker could exploit the vulnerability by using a tool like Metasploit to develop and execute an attack plan.&lt;/p&gt;

</description>
      <category>web</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>pentesting</category>
    </item>
    <item>
      <title>Information Gathering</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Sat, 01 Jul 2023 15:46:36 +0000</pubDate>
      <link>https://dev.to/fawazkh80/information-gathering-in-penetration-testing-25ak</link>
      <guid>https://dev.to/fawazkh80/information-gathering-in-penetration-testing-25ak</guid>
      <description>&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;p&gt;Information gathering is a critical phase of the penetration testing process, where the primary goal is to collect as much data as possible about the target system or application. The aim of this phase is to identify potential vulnerabilities and weaknesses that could be exploited by attackers to gain unauthorized access to a system or network. The information gathered can be used to create an attack plan and determine the best approach to exploit the identified vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Information Gathering
&lt;/h2&gt;

&lt;p&gt;There are two main types of information gathering in penetration testing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Passive Information Gathering&lt;/strong&gt;: This involves collecting information about the target system or application without directly interacting with it. This type of gathering includes searching for publicly available information about the target, such as information on the company's website, social media profiles, or job postings. Passive information gathering can also include gathering information from third-party sources, such as public databases or online forums.&lt;br&gt;
&lt;br&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Active Information Gathering&lt;/strong&gt;: This involves actively probing the target system or application to gather information. This type of gathering includes techniques such as port scanning, banner grabbing, and fingerprinting, which involve sending requests to the target system and analyzing the responses. Active information gathering can also include exploiting known vulnerabilities to gain access to additional information about the target.&lt;br&gt;
&lt;br&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Tools Used in Information Gathering
&lt;/h2&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are several tools that can be used in information gathering, including:&lt;/p&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Nmap&lt;/strong&gt;: Nmap is a popular network exploration and security auditing tool that can be used for both passive and active information gathering. It is used to identify open ports, services, and operating systems running on a target system.&lt;/li&gt;
&lt;/ul&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Shodan&lt;/strong&gt;: Shodan is a search engine that can be used for passive information gathering. It can be used to search for devices connected to the internet, such as webcams, routers, and servers.&lt;/li&gt;
&lt;/ul&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;theHarvester&lt;/strong&gt;: theHarvester is a tool used for passive information gathering. It can be used to gather email addresses, subdomains, and other information about a target from various sources, such as search engines, social media, and public databases.&lt;/li&gt;
&lt;/ul&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sublist3r&lt;/strong&gt;: Sublist3r is a tool used for passive information gathering. It can be used to enumerate subdomains of a target domain from various sources, such as search engines and public databases.

&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Using Information in Next Phase (Vulnerability Scanning)
&lt;/h2&gt;

&lt;p&gt;The information gathered in the information gathering phase can be used in the next phase of the penetration testing process, which is vulnerability scanning. The information can be used to identify potential vulnerabilities and weaknesses in the target system or application. For example, the information gathered from Nmap can be used to identify open ports and services running on the target system, which can be used to determine the attack surface. The information gathered from other tools such as theHarvester and Sublist3r can be used to identify potential targets for further testing.&lt;/p&gt;

</description>
      <category>web</category>
      <category>security</category>
      <category>pentest</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Overview of Pentesting Phases</title>
      <dc:creator>Fawazkh80</dc:creator>
      <pubDate>Sat, 01 Jul 2023 15:00:14 +0000</pubDate>
      <link>https://dev.to/fawazkh80/overview-of-pentesting-phases-4ooi</link>
      <guid>https://dev.to/fawazkh80/overview-of-pentesting-phases-4ooi</guid>
      <description>&lt;h1&gt;
  
  
  Overview
&lt;/h1&gt;

&lt;p&gt;Penetration testing, also known as pentesting, is a process of testing computer systems, networks, or web applications to identify vulnerabilities that could be exploited by attackers. Pentesting is a critical component of an organization's security program as it helps them identify and address potential vulnerabilities in their systems or applications before they can be exploited by attackers.&lt;/p&gt;

&lt;h1&gt;
  
  
  Pentesting Processes/Phases
&lt;/h1&gt;

&lt;p&gt;The pentesting process typically involves several phases, and each phase is essential to identify and address potential security vulnerabilities. The following are the six main phases of the &lt;br&gt;
pentesting process:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XvDOlQe7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5aid78m1s72yz9tqrjcz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XvDOlQe7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5aid78m1s72yz9tqrjcz.png" alt="Image description" width="800" height="556"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Planning and preparation&lt;/strong&gt;: In this phase, the scope of the assessment is defined, testing objectives are established, and the appropriate tools and techniques are identified. The tools used in this phase include project management tools, risk assessment tools, and communication tools.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Information gathering&lt;/strong&gt;: This phase involves gathering as much information as possible about the target system or application to identify potential vulnerabilities and reduce the risk of false positives during subsequent stages of the assessment. The information gathering phase can be divided into passive and active information gathering, and it includes tools such as Nmap, Sublist3r.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Vulnerability scanning&lt;/strong&gt;: This phase involves using various tools and techniques to identify vulnerabilities in the target system or application. This can include network and web application scanning, as well as manual testing techniques. The tools used in this phase include vulnerability scanners like Nessus.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Exploitation&lt;/strong&gt;: In this phase, the vulnerabilities identified in the previous phase are exploited to gain access to the target system or application. This can include using known exploits, developing custom exploits, or leveraging social engineering techniques. The tools used in this phase include Metasploit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Post-exploitation&lt;/strong&gt;: This phase involves maintaining access to the target system or application and gathering additional information about the target. This can include installing backdoors or other persistence mechanisms, escalating privileges, or exfiltrating sensitive data. The tools used in this phase include PowerShell Empire, Cobalt Strike, and Mimikatz.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Reporting&lt;/strong&gt;: In this phase, the results of the assessment are documented and presented to the client. The report typically includes details about the vulnerabilities identified, their severity, and recommendations for remediation.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  In The End
&lt;/h1&gt;

&lt;p&gt;In this series, we will continue to detail each of these phases and the tools used in them. The pentesting process is designed to help organizations identify and address potential vulnerabilities in their systems or applications before they can be exploited by attackers. By following a standardized process and using appropriate tools and techniques, pentesters can help improve the security posture of their clients and reduce the risk of successful cyber attacks.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>linux</category>
      <category>web</category>
    </item>
  </channel>
</rss>
