Advanced Penetration Testing Notes

Nmap Scanning Engine (NSE)

Some NSE’s can be very intrusive and bring down a server. Check the script categories and help for the NSE (nmap –script-help ’script name’).   nmap -sC ”target” (-sC is the shorthand for –script-default)   [view]

By: Ryno23 | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: August 14, 2017

NMAP

nmap -sS syn scan -sU UDP scan -sV version of whats there -p specify ports, only scans common by default [view]

By: mnemonicspace | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: August 13, 2017

Information Gathering

fierce -dns theharvester -d domain -l limit -b source [view]

By: mnemonicspace | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: August 13, 2017

MS

WE FINISH THIS TOPIC …  GO TO NEXT  [view]

By: functionsys | Related Lesson: Metasploit (part 3) Operation | Modified: August 13, 2017

Anotations

– Linux ( Part 2 ) – Kali Linux Commands PWD – Utilizado para saber em qual diretório você está situado [view]

By: gabrield | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: August 11, 2017

Cybrary

To automate stuffs in linux(eg) to run a command or tool on daily /hourly /monthly basis – Use crontab   [view]

By: ariela2 | Related Lesson: Programming (part 1) Fundamentals for Pen Testers | Modified: August 11, 2017

Using Kali Linux,

[view]

By: mohammad.a2khan | Related Lesson: Linux (part 1) | Modified: August 11, 2017

deva@kali

hack money [view]

By: aatmadevaputrap | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: August 11, 2017

qwe

l hack you [view]

By: aatmadevaputrap | Related Lesson: Linux (part 1) | Modified: August 11, 2017

user/pass searching

recon-ng  show modules  use recon/contacts-creds/haveibeenpwned set source (Email@email) run ————— exploit-db.com/google-dorks/      search for passlists  xamppdirpasswd.txt filetype.txt password site: domain [view]

By: primerskyline | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: August 10, 2017

« First ‹ Previous 1 3 93 101 102 103 104 105 113 203 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel