Advanced Penetration Testing Notes

Advabced

Hi I’ve liked the application and noticed it’s a fantastic thank you [view]

By: Yh12 | Related Lesson: Programming (part 1) Fundamentals for Pen Testers | Modified: March 20, 2018

coding

#!/bin/bash if [ ”$1” == ] then  echo ”Usage: ./ping.sh [network]” echo ”Example: ./ping.sh 192.168.1” else  for x in sq 254 : do  ping < ip>  [view]

By: dhruvgupta179 | Related Lesson: Programming (part 3) Network Pings | Modified: March 20, 2018

bash scripting modules

#!/bin/bash if [ ”$1” = ”” ] then echo ”Usage: ./pingscript.sh [network]” echo ”Example: ./pingscript.sh 192.168.1” fi   <end of program >  echo $PATH ./ping.sh  chmod 700 ping.sh         [view]

By: dhruvgupta179 | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: March 20, 2018

Part 3

(Part 3: Pivoting) meterpreter > ifconfig (On Windows XP VM): C:\Documents and Settings\georgia>ipconfig (On second terminal): cd /opt/smbexec , ifconfig (On first terminal): meterpreter > background msf exploit(psexec) > route add 172.16 [view]

By: GrapeApe561 | Related Lesson: Post Exploitation (part 3) Pivoting | Modified: March 19, 2018

using kali linux

nice work [view]

By: badrzine | Related Lesson: Linux (part 1) | Modified: March 19, 2018

VA

Ftp anonymous Auxiliary [view]

By: Ankit2812 | Related Lesson: Vulnerability Scanning (part 4) Metasploit | Modified: March 19, 2018

Zone Transfer

Zone Transfer host -t  ns  xyz.com hsot -l  xyz.com  ns.xyz.com   fierce.pl fierce -dns  xyz.com [view]

By: Ankit2812 | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: March 19, 2018

info gath

recon-ng (framwork for recainaissance) show modules  use recon/contacts-creds/haveibeenpwned set source geo@bulbsecu.com run   [view]

By: amine.atarboulaich | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: March 18, 2018

part 2

(Part 2- Exploit Development) (On Windows XP VM):  Download newest version of WinSCP. Start WinSCP, choose ”SCP” under File Protocol,  put Ubuntu IP under Host name, Port number 22, put Ubuntu username and password. Click Save, and clic [view]

By: GrapeApe561 | Related Lesson: Post Exploitation (part 2) Exploit Development | Modified: March 18, 2018

domain

whois  nslookup > set type=mx,ns > buucn.com host -t ns buldsecurity.com host -l bulbsecurity.com ns66.domaincontroll.com host -t ns zonetransfer.me host -l  zonetrnsfer.me nsztm2.digi.ninja fierce -dns bulbesecurity.com [view]

By: amine.atarboulaich | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: March 20, 2018

« First ‹ Previous 1 3 11 12 13 14 15 23 113 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel