Browse Source

Methodology update.

master
51x 6 years ago
parent
commit
42d77a1636
  1. 2
      LICENSE.txt
  2. 2
      penetration_test_black_box.txt

2
LICENSE.txt

@ -426,7 +426,7 @@ To use this License in a document you have written, include a copy of @@ -426,7 +426,7 @@ To use this License in a document you have written, include a copy of
the License in the document and put the following copyright and
license notices just after the title page:
Copyright (c) YEAR YOUR NAME.
Copyright (c) 2016 51x.
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.3
or any later version published by the Free Software Foundation;

2
penetration_test_black_box.txt

@ -49,6 +49,7 @@ Question ideas for full black box penetration test phases @@ -49,6 +49,7 @@ Question ideas for full black box penetration test phases
- Misconfigured services?
- Tickets (Kerberos)?
- Wrong permissions? System running world writable files?
- Bypass of functions (eg. applocker bypasses)?
- Local privilege escalation exploits?
- Other users and their interaction?
@ -59,6 +60,7 @@ Question ideas for full black box penetration test phases @@ -59,6 +60,7 @@ Question ideas for full black box penetration test phases
- /etc/passwd users?
- Wrong permissions? Guid/suid? rwxrwxrwx?
- Misconfigured services?
- Bypass of functions (eg. apparmor bypass)?
- Local privilege escalation exploits?
- Other users and their interaction (eg. X hacking)?

Loading…
Cancel
Save