Advanced Penetration Testing Notes

C programming

gcc cprogram.c : for compile c program..     [view]

By: dhaval317 | Related Lesson: Programming (part 5) Python Import Command | Modified: June 30, 2017

vuln scanning

vuln identification and verifications [view]

By: sirrush | Related Lesson: Vulnerability Scanning Intro (part 1) | Modified: June 30, 2017


nmap – portscanner Understanding the various scans will help for example -sW allows us to check the window size of a packet thus allowing fairly reliably guess an OS portscans and banner grabs would also help enumerate versions and possible vul [view]

By: sirrush | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: June 30, 2017


recong-ng is a framework to make information gathering more streamlined   [view]

By: sirrush | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: June 30, 2017


targeting using maltegoce and theharvester netcraft another resource probably has an API so it can be scripted and automated Verify the information gathered shodan [view]

By: sirrush | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: June 30, 2017


Domain Name: checking the WHOIS subdomains of a domain can use recon-ng//dig/host/nslookup dig is one of the better ones and allows for zonexfr if zone replication is not ”secure” then you can xfr all subdomains host -l domain nserver (tr [view]

By: sirrush | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: June 30, 2017


Information Gathering using OSINT to gather information on a target Remember that the more that you know the more chances you have to be successful [view]

By: sirrush | Related Lesson: Information Gathering Intro (part 1) | Modified: June 30, 2017


backdoor creator/payload generator uses several programs payload encoder into venom -o gives options -p platform must create a payload handler when using venom msfconsole multi/handler exploits/multi/handler use the same handler as payload eg set pay [view]

By: sirrush | Related Lesson: Metasploit (part 6) msfvenom | Modified: June 30, 2017


no longer used msfcli msfconsole is current allows for scripting for faster work flow.  iirc uses .rc files to automate tasks   [view]

By: sirrush | Related Lesson: Metasploit (part 5) msfcli | Modified: June 30, 2017

aux modules

aux modules such as scanners like nmap or something similar.   [view]

By: sirrush | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: June 30, 2017

« First ‹ Previous 1 25 115 123 124 125 126 127 135 225 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?