SlideShare a Scribd company logo
Penetration Testing
Wednesday, August 29
Quick Information
Join us on Discord - https://discord.gg/M2r4Tg
Firetalks
Quick Overview
1. Recon = Finding background information on target without interfacing with the target.
(Since we are doing Hack-the-Box we won’t be doing this)
2. Enumeration = Scanning machines for information; this involves scanning for open ports,
services, things that we can exploit. We want to understand how everything is operating
so we can exploit it
3. Exploitation = The fun part; we will use the information from enumeration to craft an
exploit in order to gain access to something we want but they don’t want access too.
4. Escalation = Once we get access we want to gain more access; Going from a user account
to root in this case
5. Persistence = Being able to get back in case our exploit breaks or they patch the way we
initially broke in
6. Clean up= Leaving no trace we were there ;)
Our Target (recon)
Hack the Box = Celestial
● IP Address = 10.10.10.85
● Operating System = Linux
● And … thats about all we know so far
Enumeration
● It’s always a good idea to have a scan going in the background
● Two types of scans we will focus on today
○ Network/Service Scanning
■ Nmap
■ Nessus
○ Web server Scanning
■ Gobuster
■ Nikto
■ WPScan (only for wordpress)
NMAP Results
Exploitation
Escalation
More Escalation… or is
this called Pivoting?
Clean up
● Lets delete anything that might show we were there

More Related Content

PPTX
Cryptography
PPTX
PPTX
BS CS 5 week 6 lecture 2.pptx
PDF
Footprinting-and-the-basics-of-hacking
PPT
Addmi 13-discovery overview
PPT
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
PPTX
phases_of_hacking_explained_in_brief.pptx
Cryptography
BS CS 5 week 6 lecture 2.pptx
Footprinting-and-the-basics-of-hacking
Addmi 13-discovery overview
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
phases_of_hacking_explained_in_brief.pptx

More from UTD Computer Security Group (20)

PDF
22S kickoff 2.0 (kickoff + anonymity talk)
PPTX
UTD Computer Security Group - Cracking the domain
PPTX
Forensics audio and video
PPTX
Computer networks and network security
PPTX
PPTX
Powershell crash course
PPTX
Intro to cybersecurity
PPTX
PDF
Web Exploitation
PDF
Network Exploitation
PDF
Introduction to Exploitation
PDF
Cryptography Crash Course
PDF
Fuzzing - Part 2
PDF
Exploitation Crash Course
PDF
Fuzzing - Part 1
PDF
Protostar VM - Heap3
PDF
Heap Base Exploitation
PDF
Return Oriented Programming
22S kickoff 2.0 (kickoff + anonymity talk)
UTD Computer Security Group - Cracking the domain
Forensics audio and video
Computer networks and network security
Powershell crash course
Intro to cybersecurity
Web Exploitation
Network Exploitation
Introduction to Exploitation
Cryptography Crash Course
Fuzzing - Part 2
Exploitation Crash Course
Fuzzing - Part 1
Protostar VM - Heap3
Heap Base Exploitation
Return Oriented Programming
Ad

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative analysis of optical character recognition models for extracting...
Getting Started with Data Integration: FME Form 101
Unlocking AI with Model Context Protocol (MCP)
Machine Learning_overview_presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Group 1 Presentation -Planning and Decision Making .pptx
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Tartificialntelligence_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Ad

Penetration Testing: Celestial

  • 2. Quick Information Join us on Discord - https://discord.gg/M2r4Tg Firetalks
  • 3. Quick Overview 1. Recon = Finding background information on target without interfacing with the target. (Since we are doing Hack-the-Box we won’t be doing this) 2. Enumeration = Scanning machines for information; this involves scanning for open ports, services, things that we can exploit. We want to understand how everything is operating so we can exploit it 3. Exploitation = The fun part; we will use the information from enumeration to craft an exploit in order to gain access to something we want but they don’t want access too. 4. Escalation = Once we get access we want to gain more access; Going from a user account to root in this case 5. Persistence = Being able to get back in case our exploit breaks or they patch the way we initially broke in 6. Clean up= Leaving no trace we were there ;)
  • 4. Our Target (recon) Hack the Box = Celestial ● IP Address = 10.10.10.85 ● Operating System = Linux ● And … thats about all we know so far
  • 5. Enumeration ● It’s always a good idea to have a scan going in the background ● Two types of scans we will focus on today ○ Network/Service Scanning ■ Nmap ■ Nessus ○ Web server Scanning ■ Gobuster ■ Nikto ■ WPScan (only for wordpress)
  • 9. More Escalation… or is this called Pivoting?
  • 10. Clean up ● Lets delete anything that might show we were there