Skip to content

Adding internal inf and AD testing methodologies#18

Closed
BC-Lucille wants to merge 0 commit intobugcrowd:mainfrom
BC-Lucille:main
Closed

Adding internal inf and AD testing methodologies#18
BC-Lucille wants to merge 0 commit intobugcrowd:mainfrom
BC-Lucille:main

Conversation

@BC-Lucille
Copy link

Adding methodologies for internal infrastructure and active directory testing.

@BC-Lucille BC-Lucille marked this pull request as ready for review June 18, 2025 15:08
@adarshaks91 adarshaks91 requested a review from Copilot August 18, 2025 13:59

This comment was marked as outdated.

@adarshaks91 adarshaks91 requested a review from Copilot August 18, 2025 14:40

This comment was marked as outdated.

@adarshaks91 adarshaks91 requested a review from Copilot August 19, 2025 04:42

This comment was marked as outdated.

@adarshaks91 adarshaks91 requested a review from Copilot August 19, 2025 05:29
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds two comprehensive testing methodologies for internal infrastructure and Active Directory environments. The methodologies provide structured checklists for security assessments, covering reconnaissance, vulnerability identification, and exploitation techniques.

  • Adds a detailed Internal Network Penetration Testing methodology covering network reconnaissance, protocol assessments, and service enumeration
  • Adds an Active Directory Testing methodology focusing on AD-specific attacks and privilege escalation techniques
  • Both methodologies include tool recommendations and structured approach to testing various components

Reviewed Changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 7 comments.

File Description
methodologies/Internal_Network_Methodology.json Comprehensive methodology for internal network infrastructure testing including reconnaissance, protocols, databases, and web applications
methodologies/Active_Directory_Methodology.json Structured methodology for Active Directory security testing including NTLM relay, DACL abuse, SCCM, ADCS, and Kerberos attacks

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

"tools": "Responder, Inveigh"
},
{
"key": "unpatched_software_cve",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Duplicate key 'unpatched_software_cve' found. This key was already defined on line 41, which will cause JSON parsing issues.

Copilot uses AI. Check for mistakes.
"tools": "Nmap, Zenmap"
},
{
"key": "outdated_unsupported_os",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Duplicate key 'outdated_unsupported_os' found. This key was already defined on line 47, which will cause JSON parsing issues.

Copilot uses AI. Check for mistakes.
"tools": "Nessus, nmap"
},
{
"key": "traffic_poisoning",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Duplicate key 'traffic_poisoning' found. This key was already defined on line 53, which will cause JSON parsing issues.

Suggested change
"key": "traffic_poisoning",
"key": "unpatched_software_cve_2",
"title": "Unpatched Software & CVEs",
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions. ",
"tools": "Nmap, Zenmap"
},
{
"key": "outdated_unsupported_os_2",
"title": "Outdated and Unsupported Operating Systems",
"description": "Identify hosts using outdated and end-of-life operating systems.",
"tools": "Nessus, nmap"
},
{
"key": "traffic_poisoning_2",

Copilot uses AI. Check for mistakes.
{
"key": "unpatched_software_cve",
"title": "Unpatched Software & CVEs",
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions. ",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Trailing space after the period in the description text.

Suggested change
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions. ",
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions.",

Copilot uses AI. Check for mistakes.
{
"key": "unpatched_software_cve",
"title": "Unpatched Software & CVEs",
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions. ",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Trailing space after the period in the description text.

Suggested change
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions. ",
"description": "Identify the use of outdated and unpatched software in use throughout the network. Assess which publicly disclosed vulnerabilities impact these software versions.",

Copilot uses AI. Check for mistakes.
{
"key": "tftp",
"title": "TFTP (Trivial File Transfer Protocol)",
"description": "Attempt to brute-force files from available TFTP servers. For any enumerated files, search for the presence of sensitive data (e.g credentials, configuration data). Fingerprint the TFTP software version and assess whether it is impacted by known vulnerabilities. ",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Double space between 'from' and 'available', and trailing space after the period.

Suggested change
"description": "Attempt to brute-force files from available TFTP servers. For any enumerated files, search for the presence of sensitive data (e.g credentials, configuration data). Fingerprint the TFTP software version and assess whether it is impacted by known vulnerabilities. ",
"description": "Attempt to brute-force files from available TFTP servers. For any enumerated files, search for the presence of sensitive data (e.g credentials, configuration data). Fingerprint the TFTP software version and assess whether it is impacted by known vulnerabilities.",

Copilot uses AI. Check for mistakes.
{
"key": "mssql_default_creds",
"title": "MSSQL: Default Credentials",
"description": "Determine whether you can gain access to the MSSQL server(s) using default or weak credentials (e.g sa:sa).",
Copy link

Copilot AI Aug 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Double space between 'using' and 'default'.

Suggested change
"description": "Determine whether you can gain access to the MSSQL server(s) using default or weak credentials (e.g sa:sa).",
"description": "Determine whether you can gain access to the MSSQL server(s) using default or weak credentials (e.g sa:sa).",

Copilot uses AI. Check for mistakes.
@adarshaks91
Copy link
Contributor

raised a new one here: #23

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants