eJPT
  • 馃憢Welcome
  • Tools
    • 馃敪Escaneo y Enumeraci贸n
  • SECTION 1: Assessment Methodologies
    • Assessment Methodologies: Information Gathering
      • Introducci贸n a la Recopilaci贸n de Informaci贸n
        • Start Quiz
      • Passive Information Gathering
      • Active Information Gathering
    • Assessment Methodologies: Footprinting & Scanning
      • Introduction
      • Networking Primer
      • Host Discovery
      • Port Scanning
      • Evasion, Scan Performance & Output
      • Page
      • Challenges
    • Assessment Methodologies: Enumeration
      • Overview
      • SMB Lesson
      • FTP Lesson
      • SSH Lesson
      • HTTP Lesson
      • SQL Lesson
    • Assessment Methodologies: Vulnerability Assessment
      • Vulnerability Assessment
      • Course Labs
  • SECTION 2: Host & Networking Auditing
    • Assessment Methodologies: Auditing Fundamentals
      • Assessment Methodologies
      • Practice
  • SECTION 3: Host & Network Penetration Testing
    • Host & Network Penetration Testing: System/Host Based Attacks
      • Introduction to Attacks
      • Windows Vulnerabilities
      • Exploiting Windows Vulnerabilities
      • Windows Privilege Escalation
      • Windows File System Vulnerabilities
      • Windows Credential Dumping
      • Linux Vulnerabilities
      • Exploiting Linux Vulnerabilities
      • Linux Privilege Escalation
      • Linux Credential Dumping
      • Conclusion
    • Host & Network Penetration Testing: Network-Based Attacks
      • Network-Based Attacks
    • Host & Network Penetration Testing: The Metasploit Framework (MSF)
      • Metasploit
        • Metasploit Fundamentals
      • Information Gathering & Enumeration
        • Nmap
        • Enumeration
      • Vulnerability Scanning
        • MSF
        • Nessus
        • Web Apps
      • Client-Side Attacks
        • Payloads
        • Automating
      • Exploitation
        • Windows Exploitation
        • Linux Exploitation
        • Post Exploitation Fundamentals
        • Windows Post Exploitation
        • Linux Post Exploitation
      • Armitage
        • Metasploit GUIs
    • Host & Network Penetration Testing: Exploitation
      • Introduction To Exploitation
      • Vulnerability Scanning Overview
      • Exploits
        • Searching For Exploits
        • Fixing Exploits
      • Shells
      • Frameworks
      • Windows
      • Linux
      • Obfuscation
    • Host & Network Penetration Testing: Post-Exploitation
      • Introduction
      • Windows Enumeration
      • Linux Enumeration
      • Transferring Files
      • Shells
      • Escalation
        • Windows Privilege Escalation
        • Linux Privilege Escalation
      • Persistence
        • Windows Persistence
        • Linux Persistence
      • Dumping & Cracking
        • Windows Password Hashes
        • Linux Password Hashes
      • Pivoting Lesson
      • Clearing
  • Host & Network Penetration Testing: Social Engineering
    • Social Engineering
  • SECTION 4: Web Application Penetration Testing
    • Introduction to the Web & HTTP Protocol
      • Web Applications
      • HTTP Protocol
        • HTTP/S Protocol Fundamentals
        • Website Crawling & Spidering
Powered by GitBook
On this page
  • SCAP/STIGs
  • Nmap
  • Nessus
  1. SECTION 2: Host & Networking Auditing
  2. Assessment Methodologies: Auditing Fundamentals

Practice

SCAP/STIGs

A continuaci贸n se detalla herramientas para los siguientes laboratorios que proviene del Departamento de Defensa de los Estados Unidos CMMC, el cual incluye 17 dominios de capacidad y 5 niveles de madures.

La herramienta mas utilizada es SCAP (Security Content Automation Protocol) que forma parte de STIGs (Security Technical Implementation Guides)

Son herramientas para la auditoria, cabe aclarar que SCAP es el scaner y STIGs es el compara con las normativas de seguridad.

Nmap

Se utilizara nmap, para la gestion de activos del modelo CMMC.

nmap <Target>/24
# Escaneo agresivo basado en las IPs Identificadas / Tambien nos muestra los saltos
nmap <IP,1,2,3,4> -A 

Nessus

Se ejecuta un analisis basico de descubirento de red. Para ejecutar un escaneo avanzado se debera de habilitar:

  1. El TCP desde Discovery > Por Scanning > Network Port Scanners > TCP

  2. Scan web applications desde Assessment > Web Applications > Scan web applications > Enable generic web applications tests

PreviousAssessment MethodologiesNextHost & Network Penetration Testing: System/Host Based Attacks

Last updated 8 months ago