03-pentest_platform_overview
03-pentest_platform_overview
Nota importada desde Inbox durante consolidacion bulk.
Pentest Platform overview
-
change MAC address of Unbuntu VM with first 6 characters being
00000B -
on Ubuntu PLC VM start the honeypot with:
sudo python3 -m honeypots --setup telnet,http,smb,vnc,snmp -
on Kali PLC start
terminal
netdiscover
- scan network with:
sudo netdiscover -r 10.1.0.0/24
NMAP fingerprinting
after finding the hosts, we can discover ports:
sudo nmap -Pn 10.1.0.100 -sU -F-> faster scan of UDP portssudo nmap -Pn 10.1.0.100 -p 161-> specific portsudo nmap -Pn 10.1.0.100 -p 1-65535-> all ports
Enumerate with snmp-check
snmp-check 10.1.0.100
Metasploit: the Pentesters Toolkit
THE toolkit for Pentesting.
Start Metasploit with:
sudo msfconsole
Then in metasploit use:
set and setg
Module commands:
searchuseinfooptions
example:
search modbusand returns all the module that can be useduse 6-> number to use the modbusclientinfo-> to get info on the in use moduleset RHOSTS 10.1.0.11-> set remote host of modbus host
Open Source Tools
plcscan
- navigate with
cdto plcscan folder - my plcscan folder is in
~\gits\plcscan sudo python2 plcscan.py 10.1.0.11
ICS Security Scripts
- navigate with
cdto ICSSecurityScripts folder - my plcscan folder is in
~\gits\ICSSecurityScripts sudo python3 SiemensScan.py
modbus
modbus [OPTIONS] SUBCOMMANDS [ARG] -> subcommands include read,write,dump
Next Section -> PLC Practical 1