SANS Penetration Testing: Monthly Archives: May 2013

Invasion of the Network Snatchers: Part I

[Editor's Note: In this article, Tim Medin discusses methods for penetration testing network infrastructure components, specifically through the Simple Network Management Protocol (SNMP). Tim's tips below include a nice overview of SNMP, techniques for formulating highly useful lists of potential authentication credentials for SNMP, a description of how to use an Nmap NSE script for … Continue reading Invasion of the Network Snatchers: Part I


TDS, MSSQL, and Python... Oh My!

[Editor's Note: Mark Baggett has been writing some awesome articles for this blog lately about how to use Python modules for all kinds of powerful penetration testing activities. This article is no exception — in it, Mark details how to use the Impacket suite from Core Security to interact with Microsoft SQLServer databases. The article … Continue reading TDS, MSSQL, and Python... Oh My!


Part 2: Quick and Useful Tricks for Analyzing Binaries for Pen Testers

[Editor's Note: In his previous blog post, Yori Kvitchko provided a bunch of tips penetration testers could use to analyze binary files, focusing on network communications. This time around, Yori looks at application data files, a hugely important source of information that could include passwords, hashes, or other sensitive stuff leaking out of an application. … Continue reading Part 2: Quick and Useful Tricks for Analyzing Binaries for Pen Testers


Netcat without -e? No Problem!

by Ed Skoudis Many pen testers know how to create a reverse backdoor shell with Netcat. But, what do you do if you have a Netcat that doesn't support the -e or -c options to run a shell? And, what if your target doesn't support /dev/tcp? In this article, I'll show you a nifty little … Continue reading Netcat without -e? No Problem!


Intentional Evil: A Pen Tester's Overview of Android Intents

[Editor's Note: Mobile devices, their associated infrastructures, and their juicy juicy apps are a fascinating arena that we pen testers are increasingly called upon to evaluate in target environments. In this article, Chris Crowley zooms in on a particularly important part of Android permissions known as "intents", which help control interprocess communication. Chris describes their … Continue reading Intentional Evil: A Pen Tester's Overview of Android Intents