Ques VAPT
Ques VAPT
Information Gathering is the act of gathering different kinds of information against the targeted
victim or system. It is the first step or the beginning stage of Ethical Hacking, where the
penetration testers or hackers (both black hat or white hat) performed this stage; this is a
necessary and crucial step to be performed. The more the information gathered about the
target, the more the probability to obtain relevant results. Information gathering is not just a
phase of security testing; it is an art that every penetration-tester (pen-tester) and hacker
should master for a better experience in penetration testing. There are various tools,
techniques, and websites, including public sources such as Whois, nslookup that can help
hackers to gather information. This step is necessary because while performing attacks on any
target, You may need any information (such as his pet name, best friend's name, his age, or
phone number to perform password guessing attack or other kinds of attacks).
1 GET
The GET method is used to retrieve information from the given server using a given URI. Requests using GE
retrieve data and should have no other effect on the data.
2 HEAD
Same as GET, but transfers the status line and header section only.
3 POST
A POST request is used to send data to the server, for example, customer information, file upload, etc. using
4 PUT
Replaces all current representations of the target resource with the uploaded content.
5 DELETE
Removes all current representations of the target resource given by a URI.
6 CONNECT
Establishes a tunnel to the server identified by a given URI.
7 OPTIONS
Describes the communication options for the target resource.
8 TRACE
Performs a message loop-back test along the path to the target resource.
HTTP header fields provide required information about the request or response, or about the
object sent in the message body. There are four types of HTTP message headers:
General-header: These header fields have general applicability for both request and response
messages.
Client Request-header: These header fields have applicability only for request messages.
Server Response-header: These header fields have applicability only for response messages.
Entity-header: These header fields define meta information about the entity-body or, if no body
is present, about the resource identified by the request.
- HTTP headers let the client and the server pass additional information with an HTTP request
or response. An HTTP header consists of its case-insensitive name followed by a colon (:), then
by its value. Whitespace before the value is ignored.
Custom proprietary headers have historically been used with an X- prefix, but this convention
was deprecated in June 2012 because of the inconveniences it caused when nonstandard fields
became standard in RFC 6648; others are listed in an IANA registry, whose original content was
defined in RFC 4229. IANA also maintains a registry of proposed new HTTP headers.
General headers apply to both requests and responses, but with no relation to the data
transmitted in the body.
Request headers contain more information about the resource to be fetched, or about the client
requesting the resource.
Response headers hold additional information about the response, like its location or about the
server providing it.
Entity headers contain information about the body of the resource, like its content length or
MIME type.
Connection
Keep-Alive
Proxy-Authenticate
Proxy-Authorization
TE
Trailer
Transfer-Encoding
Upgrade.
End-to-end headers
These headers must be transmitted to the final recipient of the message: the server for a
request, or the client for a response. Intermediate proxies must retransmit these headers
unmodified and caches must store them.
Hop-by-hop headers
These headers are meaningful only for a single transport-level connection, and must not be
retransmitted by proxies or cached. Note that only hop-by-hop headers may be set using the
Connection general header.
20) Write a brief note on Vulnerability Assessment and Penetration Testing (VAPT) Process
1. Goals& Objectives: - Defines goals and objectives of Vulnerability Analysis
2. Scope: - While performing the Assessment and Test, Scope of the Assignment needs to be
clearly defined.
The following are the three possible scopes exist:
Black Box Testing: - Testing from an external network with no prior knowledge of the internal
network and systems.
Grey Box Testing: - Testing from either external or internal networks, with the knowledge of the
internal network and system. It's the combination of both Black Box Testing and White Box
Testing.
White Box Testing: - Testing within the internal network with the knowledge of the internal
network and system. Also known as Internal Testing.
3. Information Gathering: - Obtaining as much information about IT environment such as
Networks, IP Address, Operating System Version, etc. It's applicable to all the three types of
Scopes such as Black Box Testing, Grey Box Testing, and White Box Testing
4. Vulnerability Detection: -In this process, vulnerability scanners are used, it will scan the IT
environment and will identify the vulnerabilities.
5. Information Analysis and Planning: - It will analyze the identified vulnerabilities, to devise a
plan for penetrating into the network and systems.
Nmap provides a number of features for probing computer networks, including host discovery
and service and operating system detection. These features are extensible by scripts that
provide more advanced service detection,[4] vulnerability detection,[4] and other features.
Nmap can adapt to network conditions including latency and congestion during a scan.
Nmap started as a Linux utility[5] and was ported to other systems including Windows, macOS,
and BSD.[6] It is most popular on Linux, followed by Windows.
Nmap features include:
Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to
TCP and/or ICMP requests or have a particular port open.
Port scanning [8] – Enumerating the open ports on target hosts.
Version detection – Interrogating network services on remote devices to determine application
name and version number.[9]
OS detection – Determining the operating system and hardware characteristics of network
devices.
Scriptable interaction with the target – using Nmap Scripting Engine[10] (NSE) and Lua
programming language.
Nmap can provide further information on targets, including reverse DNS names, device types,
and MAC addresses.[11]
Auditing the security of a device or firewall by identifying the network connections which can be
made to, or through it.[12]
Identifying open ports on a target host in preparation for auditing.[13]
Network inventory, network mapping, maintenance and asset management.
Auditing the security of a network by identifying new servers.[14]
Generating traffic to hosts on a network, response analysis and response time measurement.
[15]
Finding and exploiting vulnerabilities in a network.[16]
DNS queries and subdomain search
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry.
There are numerous companies that hire ethical hackers for penetration testing and
vulnerability assessments.
Black Hat hacking is always illegal because of its bad intent which includes stealing corporate
data, violating privacy, damaging the system, blocking network communication, etc.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a
little bounty from the owners.
28) List various things which can be derived from the HTTP header