penetration-testing | things pentesting for highly secure environments | Continuous Deployment library
kandi X-RAY | penetration-testing Summary
kandi X-RAY | penetration-testing Summary
A repo on all things pentesting for highly secure environments.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Scan a list of target ports .
- Parse the command line options .
- Start TCP connection .
- Login via ftp
- Connect to the remote host
- Handle a client .
- Run nmap scan .
- Run a command .
- Initialize connection .
- Add a client to the bot .
penetration-testing Key Features
penetration-testing Examples and Code Snippets
Community Discussions
Trending Discussions on penetration-testing
QUESTION
I don't have much experience of penetration testing, but I am currently looking at OWASP Zap.
The website I am going to pentest runs on an Amazon EC2 instance. Amazon seems to have certain requirements when it comes to security testing: https://aws.amazon.com/security/penetration-testing/
The above website says that you can run security tests on a Amazon EC2 instance but not certain ones such as DNS zone walking, DoS, etc. which is fair enough.
The problem is that I can't see exactly what OWASP Zap will do when I click the "Attack" button and I obviously don't want to upset AWS!
Has anyone else used OWASP Zap on an EC2 instance? Did it you have to configure it to not do DoS attacks, etc? Is there any way I can find out what Zap is doing (I couldn't see anything in the documentation but may have missed something)?
...ANSWER
Answered 2021-Jun-10 at 07:50Yes, I've done that. ZAP does not deliberately attempt DoS attacks (or any other attacks intended to cause damage) but it can still 'take out' insecure or badly configured applications. If you have permission from the website owner then they hopefully wont complain to Amazon and then you'll be ok.
For details of the scan rules ZAP uses see https://www.zaproxy.org/docs/alerts/ - those pages link to the relevant source code so that shpould provide you with more than enough detail ;)
QUESTION
NOTE: For those who did point it out. Yes, the code uses insecure functions shell_exec
with GET
. This is intentional. The script is part a PHP backdoor that I am using as part of the PWK course.
ANSWER
Answered 2019-May-23 at 18:36You're not actually in HTML mode, you're defining a Heredoc string and so can't break in and out of PHP. There are several ways to do this, here are two. Build a variable to insert into the Heredoc:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install penetration-testing
You can use penetration-testing like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page