0%

HTB - Setting Up

Corporate environments usually consist of heterogeneous networks (hosts/servers having different Operating Systems).

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Cry0l1t3@htb[/htb]$ tree ..

└── Penetration-Testing

├── Pre-Engagement
│ └── ...
├── Linux
│ ├── Information-Gathering
│ │ └── ...
│ ├── Vulnerability-Assessment
│ │ └── ...
│ ├── Exploitation
│ │ └── ...
│ ├── Post-Exploitation
│ │ └── ...
│ └── Lateral-Movement
│ └── ...
├── Windows
│ ├── Information-Gathering
│ │ └── ...
│ ├── Vulnerability-Assessment
│ │ └── ...
│ ├── Exploitation
│ │ └── ...
│ ├── Post-Exploitation
│ │ └── ...
│ └── Lateral-Movement
│ └── ...
├── Reporting
│ └── ...
└── Results
└── ...
````

## Note Taking
Note-taking is another essential part of our penetration testing because we accumulate a lot of different information, results, and ideas that are difficult to remember all at once. There are five different main types of information that need to be noted down:

- Newly discovered information
- Ideas for further tests and processing
- Scan results
- Logging
- Screenshots

Logging is essential for both documentation and our protection. If third parties attack the company during our penetration test and damage occurs, we can prove that the damage did not result from our activities. For this, we can use the tools script and date.

To start logging with `script` (for Linux) and `Start-Transcript` (for Windows), we can use the following command and rename it according to our needs. It is recommended to define a certain format in advance after saving the individual logs. One option is using the format `<date>-<start time>-<name>.log`.

**Script:**

```sh
Cry0l1t3@htb[/htb]$ script 03-21-2021-0200pm-exploitation.log
Cry0l1t3@htb[/htb]$ <ALL THE COMMANDS>
Cry0l1t3@htb[/htb]$ exit