Methodology update.
parent
104869c865
commit
42d77a1636
|
@ -426,7 +426,7 @@ To use this License in a document you have written, include a copy of
|
|||
the License in the document and put the following copyright and
|
||||
license notices just after the title page:
|
||||
|
||||
Copyright (c) YEAR YOUR NAME.
|
||||
Copyright (c) 2016 51x.
|
||||
Permission is granted to copy, distribute and/or modify this document
|
||||
under the terms of the GNU Free Documentation License, Version 1.3
|
||||
or any later version published by the Free Software Foundation;
|
||||
|
|
|
@ -49,6 +49,7 @@ Question ideas for full black box penetration test phases
|
|||
- Misconfigured services?
|
||||
- Tickets (Kerberos)?
|
||||
- Wrong permissions? System running world writable files?
|
||||
- Bypass of functions (eg. applocker bypasses)?
|
||||
- Local privilege escalation exploits?
|
||||
- Other users and their interaction?
|
||||
|
||||
|
@ -59,6 +60,7 @@ Question ideas for full black box penetration test phases
|
|||
- /etc/passwd users?
|
||||
- Wrong permissions? Guid/suid? rwxrwxrwx?
|
||||
- Misconfigured services?
|
||||
- Bypass of functions (eg. apparmor bypass)?
|
||||
- Local privilege escalation exploits?
|
||||
- Other users and their interaction (eg. X hacking)?
|
||||
|
||||
|
|
Loading…
Reference in New Issue