Post your mental/physical to do lists or general agendas here.
Mine:
A lot of the stuff enlisted are old, but w/e.
Feel free to discuss them as well.
Results 1 to 6 of 6
Thread: To-do lists ITT
- 07 Sep. 2012 06:25pm #1
To-do lists ITT
- 07 Sep. 2012 08:05pm #2
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 63.00
- 07 Sep. 2012 08:19pm #3
Works for me
- 07 Sep. 2012 08:27pm #4
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 149.00
- 07 Sep. 2012 08:39pm #5
Contriboot 2 thread.
Also, Desktop Thread
Show LG your desktop
- 07 Sep. 2012 09:38pm #6
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 7331.00
So, my current to-do list:
(This is all written on multiple pages in a notebook sitting next to my desk)
* Finish any current work for school
* Turn on computer
* Boot Virtual Box
* Boot up BackTrack 5 R3
* Read summary of all networking tools
* Download scanrand and all other needed UNIX tools
--* Download nslookup
--* Read up on UNIX's "host" and "dig" commands
--* Download ghba
--* Read up on mapping subdomains with host command
--* Try doing an FTP bounce scan, to test out the method
--* Download scanudp
* First, discover all IPs/Netblocks that ---- ----------- owns
* Port scan all of the IPs using Scanrand
* Check to see if any open ports are known backdoors. If so, bruteforce/dictionary the password or take over the shell if not passworded.
* If no backdoors, record what popular services run on each of those ports, or see if you can fingerprint what services are running (Nmap intense scan normally can)
* Try to check versions of those services. Record versions.
* Check for vulnerabilities in those versions of the services
* If there are vulnerabilities, exploit them through multiple bounces and proxies
* Use fragroute to test if the severs are vulnerable to fragmenting probe packets, so they're not picked up by an IDS
* Map all filters and connection bounces on the network
* Emulate multiple attacking hosts to try to render IDS software and filters useless, maybe even rape logs/log size
* Learn what all of th edifferent commands available in nmap are, along with how to use nmap in terminal mode
* Try source routing with the ---- ----------- servers
* Download lsrscan and lsrtunnel
* Download libpcap (newest version, somewhere around 2) and libdnet
* Download hping2 and firewalk
* Information that can be gleaned through low-level IP assessment: Uptime of target host, TCP services that are permitted through firewall, TCP sequence and IP ID incrementation, and The OS of the target host (Again, nmap intense scan)
* Read up on the following topics:
Port scanning
TCP/IP
DNS
Network Security
WEb Security
Phone systems
ATT
Bell
Stocks/Investing
Flipping cars
Flipping houses
Flipping businesses
Efficent ways to do things
Marketing
Economics
Propaganda in America
* Scan all net ranges of ---- ----------- using nmap. Label all up an down hosts, and what each host is. First Intense Scan, then intense scan with -Pn flag set
* Use firewalk to detect any firewalls and filtered ports. Write down the servers and what ports are filtered on them
* Detect and label ---- servers. See if it's possible to exploit port ---
* Try to find out if any IDS' are active on any of the networks. If so, see if it can be ---------- ---- ---------- ---- ----- -- -----
* Scan all mapped/interesting servers using scnarand to scan all 65535 ports. Document any open or filtered ports that were originally missed
* Use ---- -------- ---------- maltego scan to determine what net ranges and IP addresses to scan
* Try DNS zone transfers, subdomain scanning, and netblock scanning against all of the mapped/interesting servers.
* Finished all old to-do lists
* Download ebooks and read up on "Interesting topics" list if not already done
* Install BackTrack 5 on the Virtualbox's HDD instead of booting the LiveCD in Virtual Box
* Finish the "pen test" against --------
* Collect results
* Assemble a ------- -- --- ----- -----
* ---- -- -- - ------- -- ----- ----- ------ ---- ----------- ------------ --- --- ----- ---------- ----------
* ------- --- ----- ------- --- ---------- ---- -- ------ -- ---------
(the last five or suld be dashed out anyway, so I'm not going to bother typing them.)
As you can see, I really like to-do lists