OP 01 July, 2020 - 07:15 AM
(This post was last modified: 01 July, 2020 - 07:16 AM by Uninterupted.)
This is going to be a fast tutorial.
This will be the FASTEST way into a network, as I can see.
Feel free to edit/remove parts for quick reference.
FIRST PART OF TUTORIAL IS FOR REMOTE TARGETS, SECOND PART IS FOR SOCIAL ENGINEERING/PHYSICAL PENTESTING
REMOTE TARGETS:
To get into network, use nMap to find any "open" ports. If an open port is found, use nMap's -O feature to scan for what OS the system is running. If it is running linux or an old windows system, you can exploit the OS directly, using tools such as metasploit. If the system is updated, you may need a 0day, or some social engineering.
Find a login portal, there is always one somewhere, such as the website that hosts the target's system (godaddy, for example). When found, sometimes social engineering the support team can work. However, it is far easier to launch a phishing attack against the website owner. To do that, use an OS like kali linux, which gives you access to tools to clone websites, make phishing pages, etc. Then, simply email the owner of the server a phishing page. If you cannot find an email, there are tools to do that. Almost every system has at least one vulnerable device that can be hacked, ESPECIALLY PRINTERS. PRINTERS ARE ALMOST ALWAYS THE EASIEST THING TO EXPLOIT.
TL;DR- (NMAP -O), (EXPLOIT OS IF POSSIBLE USING METASPLOIT, etc.), if not, use 0day, phishing, social engineering. If not, find printers through google dorks, enumeration,censys/shodan, etc.
PHYSICAL TARGETS:
Remember, human security is horrible. Security guards do not really care for their job with their life, and as such, are lazy. Instead of social engineering the helpdesk, which could work, try going directly to security. However, you must first really have an alibi for being there. How are you dressed? If it's appropriate for the place you are in, you may just blend in. But wearing a clown outfit in a bank can turn heads! Wear something casual - not your black hoodies, unless identity concealment is a priority. If you don't look like a hacker, then they might never even suspect you. Also, always have at least 3 fake social media accounts, with photos of you, but different name. Use a greenscreen to photoshop yourself onto photos, so when you quickly show people the photos, they think they are real. Make yourself look like you're on vacation. Have an alibi that you're some innocent tourist. But don't make it too obvious. Pose with a family member and claim they are your marital partner, or take photos with lots of random peoples cats and claim to be a cat rescuer. People love people who "do good things". So if you look like someone who belongs there, social engineering can get you anywhere.
CAMERAS? NO PROBLEM!
Physical pentesters need to conceal their identity. The best time to enter a building is at night, around 5:00 - 6:00, as night shift will be tired, and probably asleep. The break of dawn is the weakest point in human security, usually speaking. Use techniques such as CO2 in a doorcrack by a motion sensor, lockpicks, or RFID grabbers/cloners. If security cameras must be disabled without damaging, you may use duct tape. If you must get past cameras without being seen, IR LED's as well as high blue LED's can be purchased and wired to a breadboard and strapped around the body, blinding cameras at all angles. You may use a briefcase as a disguise to hide your head from cameras, as well as a way to move tech in. Raspberry PI's can be used to run exploits, or to "jam" certain signals, such as RFID, cellphones, wifi, etc.
I also suggest using a laptop in a backpack, and RDP into it using a phone, so people only see your phone and don't get freaked out. People sitting at a bank with laptop can raise a red flag. Sitting outside having a cigarette with your phone is a great way to distract, especially if your computer is inside. Normies assume that computers must be next to you for you to hack.
If This Helped You Leave A Like!
This will be the FASTEST way into a network, as I can see.
Feel free to edit/remove parts for quick reference.
FIRST PART OF TUTORIAL IS FOR REMOTE TARGETS, SECOND PART IS FOR SOCIAL ENGINEERING/PHYSICAL PENTESTING
REMOTE TARGETS:
To get into network, use nMap to find any "open" ports. If an open port is found, use nMap's -O feature to scan for what OS the system is running. If it is running linux or an old windows system, you can exploit the OS directly, using tools such as metasploit. If the system is updated, you may need a 0day, or some social engineering.
Find a login portal, there is always one somewhere, such as the website that hosts the target's system (godaddy, for example). When found, sometimes social engineering the support team can work. However, it is far easier to launch a phishing attack against the website owner. To do that, use an OS like kali linux, which gives you access to tools to clone websites, make phishing pages, etc. Then, simply email the owner of the server a phishing page. If you cannot find an email, there are tools to do that. Almost every system has at least one vulnerable device that can be hacked, ESPECIALLY PRINTERS. PRINTERS ARE ALMOST ALWAYS THE EASIEST THING TO EXPLOIT.
TL;DR- (NMAP -O), (EXPLOIT OS IF POSSIBLE USING METASPLOIT, etc.), if not, use 0day, phishing, social engineering. If not, find printers through google dorks, enumeration,censys/shodan, etc.
PHYSICAL TARGETS:
Remember, human security is horrible. Security guards do not really care for their job with their life, and as such, are lazy. Instead of social engineering the helpdesk, which could work, try going directly to security. However, you must first really have an alibi for being there. How are you dressed? If it's appropriate for the place you are in, you may just blend in. But wearing a clown outfit in a bank can turn heads! Wear something casual - not your black hoodies, unless identity concealment is a priority. If you don't look like a hacker, then they might never even suspect you. Also, always have at least 3 fake social media accounts, with photos of you, but different name. Use a greenscreen to photoshop yourself onto photos, so when you quickly show people the photos, they think they are real. Make yourself look like you're on vacation. Have an alibi that you're some innocent tourist. But don't make it too obvious. Pose with a family member and claim they are your marital partner, or take photos with lots of random peoples cats and claim to be a cat rescuer. People love people who "do good things". So if you look like someone who belongs there, social engineering can get you anywhere.
CAMERAS? NO PROBLEM!
Physical pentesters need to conceal their identity. The best time to enter a building is at night, around 5:00 - 6:00, as night shift will be tired, and probably asleep. The break of dawn is the weakest point in human security, usually speaking. Use techniques such as CO2 in a doorcrack by a motion sensor, lockpicks, or RFID grabbers/cloners. If security cameras must be disabled without damaging, you may use duct tape. If you must get past cameras without being seen, IR LED's as well as high blue LED's can be purchased and wired to a breadboard and strapped around the body, blinding cameras at all angles. You may use a briefcase as a disguise to hide your head from cameras, as well as a way to move tech in. Raspberry PI's can be used to run exploits, or to "jam" certain signals, such as RFID, cellphones, wifi, etc.
I also suggest using a laptop in a backpack, and RDP into it using a phone, so people only see your phone and don't get freaked out. People sitting at a bank with laptop can raise a red flag. Sitting outside having a cigarette with your phone is a great way to distract, especially if your computer is inside. Normies assume that computers must be next to you for you to hack.
If This Helped You Leave A Like!