Advanced Penetration Testing Notes

ettercap

Kali man in the middle > ettercap -Ti eth0 -M arp:remote /192.168.1.1/ / 192.168.1.76 arp spoof out come > nano/proc/sys/net/ipv4/ip_forward wireshark > filter TLSv1 or HTTP ettercap >nano /etc/ettercap/ettercap.com (turn off ipv4)     [view]

By: Oishi | Related Lesson: Traffic Capture (part 5) ettercap | Modified: August 3, 2017

M1P3:Diretórios; Manip.arq.

##Tudo no linux é um arquivo(file) *Comandos (manipulação de arquivos)   cp => copy  //  (# cp  fonte   destino)   mv => move //  (# mv   fonte   destino)   rm => remove  //  (# rm   file)   touch myfile   //  (cria um no [view]

By: tonyveloso | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: August 15, 2017

python

#!/usr/bin/python import socket ip = raw_input(”Enter the IP address: ”) port = input(”Enter the port number: ”) sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) if sock.connect_ex((ip.port)): print ”port”, [view]

By: mehroz003 | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: August 2, 2017

Programming (part 5)

1. [view]

By: codeitch | Related Lesson: Programming (part 5) Python Import Command | Modified: August 2, 2017

Programming (part 4)

1. compiled language vs interpreted language [view]

By: codeitch | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: August 2, 2017

start Metasploit

service postgresql start service metasploit start msfconsole   [view]

By: pha3t0n | Related Lesson: Metasploit (part 3) Operation | Modified: August 2, 2017

linux commands

open the terminal root@kali:-# pwd /root root@kali:-# man pwd root@kali:-# man ls (list directory) root@kali:-# ls / root@kali:-# l/ root@kali:-# pwd /root root@kali:-#cd/(change directory)         [view]

By: jayelkawaii8 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: August 2, 2017

metasploit

XP SP 3   [view]

By: pha3t0n | Related Lesson: Metasploit (part 2) Fundamentals | Modified: August 2, 2017

C Script

#include <stdio.h> int main(int argc, char *argv[]) { if (argc < 2) { printf(”%s\n”, ”Pass your name as an argument”); return -1; } else  { print(”Hello %s\n”, argv[1]) return 0; } } [view]

By: pha3t0n | Related Lesson: Programming (part 5) Python Import Command | Modified: August 2, 2017

Python scripting

#!/usr/bin/python import socket ip = raw_input(”Enter the IP Address: ”) port = input(”Enter the port number: ”) sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) if sock.connect_ex((ip,port)): Indent print ”Port& [view]

By: pha3t0n | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: August 2, 2017

« First ‹ Previous 1 8 98 106 107 108 109 110 118 208 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel