0% found this document useful (0 votes)
0 views18 pages

Advanced_Task2_Practical

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 18

Advanced Task 2 Practical

Report

INTRODUCTION
NMAP:

1. Nmap (Network Mapper)


o Description: Nmap is an open-source tool used for network
discovery and security auditing. It can perform various types of
scans such as SYN scan, TCP connect scan, UDP scan, etc.
o Key Features:
 Host discovery
 Port scanning
 OS detection
 Service version detection
 Scriptable interaction with the target

NMAP Scan provided details of


Ports and Services also provide
status of Ports.

NMAP is used to see


which hosts are up is
network
List IP address of
devices connected
to the network.

Using –

traceroute, we can see the number of hops to connect to


target system.

We can extract details for


a particular port using –p
option.
NMAP allows us to
scan for TCP ports only
using –sT option.

NMAP allows
us to scan for
UDP ports only
using –sU
option
BURPSUITE

Burp Suite is powerful web application testing platform used by security


engineers and Bug Bounty Hunters.
Here are some uses of Burp Suite:
1. Comprehensive Testing: Burp Suite offers a wide range of tools for
security testing.
2. Ease of use: It has user-friendly interface easy suitable for beginners and
professionals.
3. Customizability: You can extremely customize it to suit your various
testing scenarios.

Key Features of Burp Suite

1. Proxy Server: Central to its functionality, it intercepts traffic between


the client and the server, allowing for the analysis and manipulation of
requests and responses.
2. Scanner: Available in the professional edition, it automatically detects
security vulnerabilities in web applications.
3. Intruder: A powerful tool for performing automated attacks to identify
vulnerabilities.
4. Repeater: Allows for the manual modification and resending of
individual requests.
5. Sequencer: Analyses the randomness of session tokens.
6. Comparer: Used for comparing the responses of two different requests.
7. Extender: Lets users add custom extensions to enhance functionality.
PROXY
Burp Suite’s Proxy tool allows you to intercept and inspect traffic between
your browser and the target, helping identify vulnerabilities like cross-site
scripting (XSS) and SQL injection.
REPEATER
The Repeater tab tool lets you test custom requests and analyse response,
providing greater control over vulnerability detection.
INTRUDER
Intruder tool allows you to launch automated attacks on web applications to
test their security.

With the Burp Intruder, you can test for a wide range of vulnerabilities. This
includes SQL injection, cross-site scripting (XSS), and directory traversal. The
intruder is highly flexible, allowing us to customize our attacks.
INTRUDER - PAYLOAD
We can also use the intruder to perform specific audits such as brute-forcing,
dictionary attacks, and fuzzing. The Intruder also lets us target specific areas of
the application by selecting custom parameters.
Under Intruder Tab, In Payloads section, we can provide a word list for
extracting the passwords, each fuzzed value required individual payload.
WIRESHARK

Wireshark is a widely-used network protocol analyser that captures packets from network
connections. Here are its key benefits:

1. Granular Analysis: Wireshark allows you to inspect packet contents at a detailed


level, helping troubleshoot network issues.
2. Filtering Options: You can focus on specific packets or protocols of interest using
powerful filters.
3. Network Performance: It assists in analysing network performance and identifying
security vulnerabilities.
4. Open-Source: Wireshark is open-source, backed by a large community of developers
FILTER By Protocol, Source, Destination or combination of
all.

Filer by
protocol http

Filter by TCP
Protocol for
Port 80.
Filter by
Source or
Destination IP
address

By clicking on
any packet we
get Individual
Packet Details.
Filter by
Source IP
address.

Filter by
Destination IP
address.
Combine IP
Source or
Destination
address and TCP
Port value.
NIKTO

Function: Nikto is a web server scanning tool designed for vulnerability


assessment.
Usage:
 Scans web servers for misconfigurations, out-dated software, and
potential vulnerabilities.
 Identifies default files, insecure programs, and risky configurations.
 Supports SSL scanning and HTTP proxy.
Features:
 Web-focused: Nikto targets web servers, analysing HTTP responses.
 Vulnerability checks: Detects potentially dangerous files and programs.
 Credentials guessing: Can guess credentials for authorization.
 Customizable scans: Offers various options for tailored assessments.
Example Command: nikto -h <target server>
REFERENCES
 https://bito.ai/resources/burp-suite/
 https://www.freecodecamp.org/news/how-to-audit-web-apps-with-
burpsuite/
 https://www.eccouncil.org/cybersecurity-exchange/penetration-
testing/burp-suite-penetration-testing-web-application/
 https://www.trustradius.com/products/portswigger-burp-suite/
reviews
 https://en.wikipedia.org/wiki/Burp_Suite
 https://www.jamesparker.dev/what-is-the-function-of-nikto-in-web-
server-vulnerability-scanning/
 https://www.geeksforgeeks.org/what-is-nikto-and-its-usages/
 https://www.freecodecamp.org/news/an-introduction-to-web-server-
scanning-with-nikto/
THANK YOU

Done by
Prajakta Shende
Cybersecurity Intern
CyberSapiens

You might also like