`

Summary

In this chapter, we wrapped up our reconnaissance activities by

performing vulnerability scanning and fuzzing. We also verified the

vulnerabilities we discovered, weeding out potential false positives.

Along the way, we used bash scripting to perform several tasks.

We scanned for vulnerabilities, wrote custom scripts that can

perform recursive downloads from misconfigured webservers,

extracted sensitive information from git repositories, and more. We

also created custom wordlists using clever bash scripting and

orchestrated the execution of multiple security tools to generate a

report.

Lets recap what weve identified so far, from a reconnaissance

perspective:

1. Hosts running multiple services (HTTP, FTP, SSH) and their

versions

2. A web server running WordPress with a login page enabled

and a few vulnerabilities, such as user enumeration and an

absence of HTTP security headers

3. A web server with a revealing robots.txt file containing paths

to custom upload forms and a donation page.

4. An anonymous login-enabled FTP server

5. Multiple open git repositories

6. OpenSSH servers that allows password-based logins

In the next chapter, we will use the vulnerabilities identified in

this chapter to establish an initial foothold by exploiting

vulnerabilities and taking over servers.

Black Hat Bash (Early Access) © 2023 by Dolev Farhi and Nick Aleks