Advanced Penetration Testing Notes

Netcat Linux

nano – not cliche like VI/VIM! wow netcat can be used to make TCP/IP connections nc -lvp 1234 (-ListenVerbosePort 1234)   [view]

By: jimmypham25 | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: July 27, 2017

Linux (part 4)

1. permitions: owner, group, everybody else 2. chmod => set permissions for an owner, a group and for everybody else 3. ”|” a pipe of the output into the input 4. cut -d ” ” -f 1 => cut delimiter (space) of the first fie [view]

By: codeitch | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: July 27, 2017

Exploit Development (Part 3) Stack Frame for Function

Exploit Development (Part 3) Stack Frame for Function:   [view]

By: bltsec | Related Lesson: Exploit Development (part 3) Stack Frame for Function | Modified: July 27, 2017

Exploit Development (Part 2) A Program in Memory

Exploit Development (Part 2) A Program in Memory: Registers: store data in cpu for us to use and registers depend on platform ie x86 or arm. E means Extended for 32 bit. A reserved area o ed area of memory used to keep trac eep track of a programR [view]

By: bltsec | Related Lesson: Exploit Development (part 2) A Program in Memory | Modified: July 27, 2017

Exploit Development Introduction (Part 1)

Exploit Development Introduction (Part 1):   [view]

By: bltsec | Related Lesson: Exploit Development Introduction (part 1) | Modified: July 27, 2017

Post Exploitation (Part 2) Exploit Development

Post Exploitation (Part 2) Exploit Development:   [view]

By: bltsec | Related Lesson: Post Exploitation (part 2) Exploit Development | Modified: July 27, 2017

Post Exploitation (Part 1) File Transfer w/o Interactive Shell

Post Exploitation (Part 1) File Transfer w/o Interactive Shell: Meterpreter shell: hashdump command, upload and download commands, TFTP, SFTP, netcat, meterpreter scripts(may be phased out and turned into post-exploitation modules), run getgui is an [view]

By: bltsec | Related Lesson: Post Exploitation (part 1) File Transfer without and Interactive Shell | Modified: July 27, 2017

Info gathering (domains) commands

Commands used whois nslookup host fierce [view]

By: masterimpaler | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: July 27, 2017

Traffic Capture DNS

DNS Cache Poisoning >host.txt: 192.168.20.9 www.gmail.com Restart arpspoofing between gateway and target >dnsspoof -i eth0 -f host.txt > arpspoof -i eth0 -t 192.168.1.1 192.168.1.80 (= says I am the gateway) > nano hosts.txt > 127.0.0. [view]

By: Oishi | Related Lesson: Traffic Capture (part 4) DNS | Modified: July 27, 2017

Programming Bash Scripting and If/Then

nano ping.sh (shellscript)if [ ”$1” == ”” ] //if 1st command line is blankthen#!/bin/bashecho ”Usage: ./ping.sh [network]”echo ”Example: ./ping.sh 192.168.1”fi Save.Run from the directory that it’ [view]

By: | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: July 26, 2017

« First ‹ Previous 1 10 100 108 109 110 111 112 120 210 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel