PDR Process - VaporVM
PDR Process - VaporVM
This document is created to mention the tools used for PDR. Each tool’s usage/working is also
mentioned.
2 Centralops https://centralops.net/co/
3 Whatruns https://www.whatruns.com/
4 Wappalyzer https://www.wappalyzer.com/
6 Hunter https://hunter.io/chrome
9 Websitepulse https://www.websitepulse.com/tools/
12 Abuseipd https://www.abuseipdb.com/
13 Xforce https://exchange.xforce.ibmcloud.com/
14 Theharvester https://tools.kali.org/information-gathering/
theharvester
15 Ipinfo https://ipinfo.info/index.php
16 Gobuster https://tools.kali.org/web-applications/gobuster
Below is the sample of PDR and the tools used for each section.
Public Discovery Report
Help AG
Reputation is everything to an
organization and a single data breach
can destroy a reputation in a fell
swoop. So, you need to be secure
from Cyber threats.
IP Addresses, open ports, and running services
We identified the following IP addresses, ports and services relevant to your organization:
Technology Stack
We identified the following technologies running on your website:
Item Description
CMS WordPress 4.9.10, Mousewheel JS
JavaScript Frameworks jQuery 1.8.2, Page JS, HoverIntent JS, jQuery Waypoints
● Install below mentioned extensions for technology stack in Chrome and Firefox
● Whatruns
● Wappalyzer
Strict-Transport-Security HTTP Strict Transport Security is an excellent feature to support on your site and
strengthens your implementation of TLS by getting the User Agent to enforce the
use of HTTPS. Recommended value "Strict-Transport-Security: max-
age=31536000; includeSubDomains".
Content-Security-Policy Content Security Policy is an effective measure to protect your site from XSS
attacks. By whitelisting sources of approved content, you can prevent the
browser from loading malicious assets.
Referrer-Policy Referrer Policy is a header that allows a site to control how much information
the browser includes with navigations away from a document.
Feature-Policy Feature Policy is a new header that allows a site to control which features and
APIs can be used in the browser.
Expect-CT Expect-CT allows a site to determine if they are ready for the upcoming Chrome
requirements and/or enforce their CT policy.
● The vulnerabilities of the technology stack can be found using google by searching CVE details
Login pages
N/A
● Manual searching for example, end or website URL use /login, /admin, etc.
Excel N/A
documents
Install the below mentioned extensions for chrome and Firefox and extract emails
● Email Extractor Pro
● Hunter
● https://haveibeenpwned.com/
Remediation Actions
● Close the ports unnecessary TCP/UDP Ports on which no services are running.
● Test all the web applications and web servers to check whether default configurations are changed
to avoid brute forcing and server-side attacks.
● Web-applications could be prone to SQL injection, XSS & other web-based vulnerabilities. Web
applications which are used internally should not be exposed to outside world.
● User accounts can be brute forced or locked if user mail IDs are found. Do not expose sensitive data
● User accounts can be brute forced or locked if user mail ids’ are found. Do not expose sensitive data
to the outside world in order to maintain data confidentiality.
● Change all the passwords of breached accounts and do not use common passwords for different
applications.
● Emails of admins and admin accounts for web management consoles (DirectAdmin, WordPress)
should be changed regularly.
● Web Application Firewall should be installed to defeat automated scanners.
● DNS should not allow any sub-domains listing and automatic zone transfers to un-authorized clients.
● List of disallowed directories from robots.txt should be removed and access to web-management
(Word Press & Direct Admin) should be allowed to specific IPs.
● Test all the servers that are using older versions of operating system whether prone to security
misconfigurations.
● Upgrade the website technologies used to the latest version.
Host records: These records point your domain to the IP address of your website or hosting.
Host IP
https://www.helpag.com/ 91.73.222.178
Name server records: These records specify an authoritative name server for given host.
Host IP
ns1.gratisdns.dk 217.61.111.93
ns2.gratisdns.dk 185.10.10.53
ns3.gratisdns.dk 185.43.209.139
ns4.gratisdns.dk 62.61.159.230
ns5.gratisdns.dk 45.76.144.57
MX records: These records specify a mail exchange server for a DNS domain name.
Host IP
eu-smtp-inbound-2.mimecast.com 91.220.42.136
eu-smtp-inbound-1.mimecast.com 195.130.217.201
The above mentioned information can be found using the following websites
● Centralops
● Websitepulse
● Maltego
Maltego
● Maltego