Maltego is an intelligence-gathering tool, that is available for Windows, Mac, and Linux. We will be using Kali Linux where it’s known by default. Remember to register on their website and I have it configured.
There are a lot of things Maltego can do not just information gathering it can also brute force a website login page, SQL injection, and scanning the targets. Now we will be looking at how to do a quick Vulnerability scan on a website using Maltego.
Also Read the Complete list of Kali Linux Tutorials
Open a terminal and type “ maltegoce ”. You should have it up and running, register and make sure you give a legit email id since they will be sending confirmation links, etc. Now it will ask you to start a machine.
Open the terminal and type in “apt-get install maltego-teeth“.
After installing Maltego teeth, we will have to import the configuration file from the following location /opt/Teeth/etc/Maltego_config.mtz.
select all the entities and click next and finish.
Press Ctrl + t. you will have a blank graph open in front of you. To your left you will be having the palette, play around with it you can see a lot of entities like banners, ports, websites, etc. Drag the website entity to the blank graph and type in the website you want.
Now let’s try to obtain the IP address through reverse DNS to IP. Scroll down the run view to find “To IP Address [DNS]”
Then click on the IP address and to your left search for the local transform “TTNMAPPLUS“ and click on the play button, it’s going to take a minute or two depending upon your internet connection speed to pop up the results. it will show the open ports.
Now select all the ports, do a banner grabbing, and show the services associated with those ports using ” TTservicetoPort” and “TTServiceToBanner”.
We will do a quick vulnerability scanning using “TTquickVulnSearch” to see if maltego picks anything juicy.
Maltego found that the web server was running a Debian 5 server which is really old and prone to many vulnerabilities. it also shows what types of vulnerabilities are listed in the details view to the right.
Also, Read
Hackers Massively Scanning for SAP Recon Vulnerability
10 Best Vulnerability Scanner Tools For Penetration Testing – 2023
A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created…
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…