Advanced Penetration Testing Notes

Comandos archivos

Comandos: touch mkdir cp mv echo > >> cat nano vi [view]

By: alejandra21 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: July 21, 2017

linux-part-2

1. erase the dragoon when taking a print-screen 2. pwd => print working directory 3. sudo is only temporary for one command [view]

By: codeitch | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: July 21, 2017

p3

1- cp  (for copy) 2- mv  (for rename) 3- rm  (for remove) 4-  echo hi mosa>filename  (will write inside the file)and use cat to open it 4-  echo hi mosa again>>filename (for writing down line and avoiding over writing 5- nano filename [view]

By: mosa3 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: July 20, 2017

p2

1-  adduser mosa 2- su mosa 3- adduser mosa sudo    [view]

By: mosa3 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: July 20, 2017

Tools

Theharvester netcraft.com     [view]

By: ashimdutta99 | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: July 20, 2017

My Notes

This is pretty good. [view]

By: ashimdutta99 | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: July 20, 2017

Metasploit

Kali >service postgresql start > service metasploit start >msfconsole username security >use auxiliary/scanner/ftp/anonymous new term> cat classscan.gnmap >cat classscan.gnmap |grep Up | cut -d ”” -f 2 192.168.1.80 192.1 [view]

By: Oishi | Related Lesson: Vulnerability Scanning (part 4) Metasploit | Modified: July 20, 2017

linux 101

cat myfile | grep B | cut -d(d is a delimiter) ”  ” -f(f is field then set the field number e.g -f 1 means field number one  ) [view]

By: deno34 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: July 19, 2017

Linux

Linux course Notes [view]

By: | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: July 19, 2017

notas

use auxiliary/scanner/smb/pipe_auditor [view]

By: nandxho | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: July 17, 2017

« First ‹ Previous 1 15 105 113 114 115 116 117 125 215 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel