PTES技术指南.docxVIP

  • 107
  • 0
  • 约31.56万字
  • 约 266页
  • 2017-07-15 发布于四川
  • 举报
PTES Technical GuidelinesThis section is designed to be the PTES technical guidelines that help define certain procedures to follow during a penetration test. Something to be aware of is that these are only baseline methods that have been used in the industry. They will need to be continuously updated and changed upon by the community as well as within your own standard. Guidelines are just that, something to drive you in a direction and help during certain scenarios, but not an all encompassing set of instructions on how to perform a penetration test. Think outside of the box.Contents?[hide]?1?Tools Required1.1?Operating Systems1.1.1?MacOS X1.1.2?VMware Workstation?Linux?Windows XP/71.2?Radio Frequency Tools1.2.1?Frequency Counter1.2.2?Frequency Scanner1.2.3?Spectrum Analyzer1.2.4?802.11 USB adapter1.2.5?External Antennas1.2.6?USB GPS1.3?Software2?Intelligence Gathering2.1?OSINT2.1.1?Corporate2.1.2?Physical?Locations?Shared/Individual?Owner.1?Land/tax records2.1.3?Datacenter Locations?Time zones?Offsite gathering?Product/Services?Company Dates?Position identification?Organizational Chart?Corporate Communications.1?Marketing.2?Lawsuits.3?Transactions?Job openings2.1.4?Relationships?Charity Affiliations?Network Providers?Business Partners?Competitors2.2?Individuals2.2.1?Social Networking Profile2.2.2?Social Networking Websites2.2.3?Cree.py2.3?Internet Footprint2.3.1?Email addresses?Maltego?TheHarvester?NetGlub2.3.2?Usernames/Handles2.3.3?Social Networks?Newsgroups?Mailing Lists?Chat Rooms?Forums Search2.3.4?Personal Domain Names2.3.5?Personal Activities?Audio?Video2.3.6?Archived Information2.3.7?Electronic Data?Document leakage?Metadata leakage.1?FOCA (Windows).2?Foundstone SiteDigger (Windows).3?Metagoofil (Linux/Windows).4?Exif Reader (Windows).5?ExifTool (Windows/ OS X).6?Image Search2.4?Covert gathering2.4.1?On-location gathering?Adjacent Facilities?Physical security inspections.1?Security guards.2?Badge Usage.3?Locking devices.4?Intrusion detection systems (IDS)

文档评论(0)

1亿VIP精品文档

相关文档