Please enable JavaScript.
Coggle requires JavaScript to display documents.
CEH - Coggle Diagram
CEH
Lockheed Martin Kill Chain
1 Reconnaissance
Harvesting email addresses, conference information, etc.
2 Weaponization
Coupling exploit with backdoor into deliverable payload.
3 Delivery
Delivering weaponized bundle to the victim via email, web, usb, etc.
4 Exploitation
Exploiting a vulnerability to execute code on victim's system.
5 Installation
Installing malware on the asset.
6 Command and Control (C2)
Command channel for remote manipulation of victim.
7 Actions on Objectives
With "hands on keyboard" access, intruders accomplish their original goals.
Ports
LDAP
389
SLP (service location protocol)
427
RDP
3389
Shodan
Search engine for service banners
OpenVAS
Vulnerability assessment scanner. Suite of tools designed to scan vulnerabilities on servers.
Commands
Netstat
Displays TCP connections
Tools
Netcat (nc)
-l
This command will instruct the local system to begin listening for TCP connections and UDP activity on a specific port number.
-p
Specify a specific port.
-v
Verbose output.
-z
URL or IP
Runs a basic port scan of the specified website.
Printf
Saves HTML code and publishes it through a local server to act as a simplified web host.
-D