Friday, January 24, 2025
HomeVulnerability AnalysisPerform Vulnerability Scanning in Your Network using Maltego

Perform Vulnerability Scanning in Your Network using Maltego

Published on

SIEM as a Service

Follow Us on Google News

Maltego is an intelligence-gathering tool, that is available for Windows, Mac, and Linux. We will be using Kali Linux where it’s known by default. Remember to register on their website and I have it configured.

There are a lot of things Maltego can do not just information gathering it can also brute force a website login page, SQL injection, and scanning the targets. Now we will be looking at how to do a quick Vulnerability scan on a website using Maltego.

Also Read the Complete list of Kali Linux Tutorials

Open a terminal and type “ maltegoce ”. You should have it up and running, register and make sure you give a legit email id since they will be sending confirmation links, etc. Now it will ask you to start a machine.

Installing Maltego Teeth

Open the terminal and type in “apt-get install maltego-teeth“.

After installing Maltego teeth, we will have to import the configuration file from the following location /opt/Teeth/etc/Maltego_config.mtz.
select all the entities and click next and finish.

Press Ctrl + t. you will have a blank graph open in front of you. To your left you will be having the palette, play around with it you can see a lot of entities like banners, ports, websites, etc.  Drag the website entity to the blank graph and type in the website you want.

Now let’s try to obtain the IP address through reverse DNS to IP. Scroll down the run view to find “To IP Address [DNS]”

Then click on the IP address and to your left search for the local transform “TTNMAPPLUS“ and click on the play button, it’s going to take a minute or two depending upon your internet connection speed to pop up the results. it will show the open ports.

Maltego

Now select all the ports, do a banner grabbing, and show the services associated with those ports using ” TTservicetoPort” and “TTServiceToBanner”.

Maltego

We will do a quick vulnerability scanning using “TTquickVulnSearch” to see if maltego picks anything juicy.

Maltego

Maltego found that the web server was running a Debian 5 server which is really old and prone to many vulnerabilities. it also shows what types of vulnerabilities are listed in the details view to the right.

Also, Read

Hackers Massively Scanning for SAP Recon Vulnerability

10 Best Vulnerability Scanner Tools For Penetration Testing – 2023

hping3 – Network Scanning Tool – Packet Generator

Latest articles

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of...

370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability

A major cybersecurity incident has come to light, with more than 370 Ivanti Connect...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

North Korean IT Workers Steal Companies Source Codes to Demand Ransomware

The Federal Bureau of Investigation (FBI) has issued fresh warnings about malicious activities by...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty

Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants...