Successfully reported this slideshow.
Your SlideShare is downloading. ×

PenTORsting

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 53 Ad

More Related Content

Similar to PenTORsting (20)

Recently uploaded (20)

Advertisement

PenTORsting

  1. 1. PenTORsting
  2. 2. $CAT README.MD JoMoZa - love is in the net BITUP ALICANTE : @bitupalicante ¡¡Telegram!!
  3. 3. DISCLAIMER TIME
  4. 4. David Lee Chaum 1981 - Mix Networks (Redes de mezcla)
  5. 5. 2002 - Primera “alpha” software libre de “Onion Routing”
  6. 6. Roger Dingledine.
  7. 7. rossulbricht@xxx.com
  8. 8. rossulbricht@xxx.com
  9. 9. LO QUE LA GENTE CREE LE QUE ES
  10. 10. PENTORSTING SOCAT TORSOCKS PROXYCHAINS INVISIBLE PROXY No DNS. ( no ICMP ) Only TCP connections.
  11. 11. PENTORSTING SOCAT apt-get install socat localhost<->Socat <-> hidden service
  12. 12. PENTORSTING SOCAT
  13. 13. PENTORSTING TORSOCKS Si no puede enrutar la peticion torsocks obligarán a la aplicación a abandonar y detener todo.
  14. 14. PENTORSTING TORSOCKS Si no puede enrutar la peticion torsocks obligarán a la aplicación a abandonar y detener todo.
  15. 15. PENTORSTING PROXYCHAINS Desarrollo interrumpido en 2013 Fork! proxychains-ng https://github.com/haad/proxychains Por defecto en kali, está en los repos de debian
  16. 16. PENTORSTING PROXYCHAINS /etc/proxychains.conf
  17. 17. PENTORSTING PROXYCHAINS /etc/proxychains.conf
  18. 18. PENTORSTING PROXYCHAINS /etc/proxychains.conf
  19. 19. PENTORSTING INVISIBLE PROXY PROXY “AS FIREWALL” - No hay config del cliente...
  20. 20. FASES DE UN PENTESTING Information gathering threat modeling & Vulnerability scan Exploitation Post-Exploitation
  21. 21. information gathering
  22. 22. DORKING EN TOR?
  23. 23. DORKING EN TOR? NO
  24. 24. threat modeling & Vulnerability scan
  25. 25. proxychain4 wpscan --verbose --wp-content-dir Custom-content proxychains4 joomscan -u XXXXXXXXXXXX.onion
  26. 26. EXPLOTATION
  27. 27. DEMO TIME
  28. 28. @bitupalicante
  29. 29. ASIAS ^^

×