Advanced Penetration Testing Notes

linux vancode

rm -delete file chmod [num]- permissions [view]

By: scriptkidgreenhat | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: May 7, 2017

Linux

Using kali Linux intro next video 1hr long   [view]

By: sirrush | Related Lesson: Linux (part 1) | Modified: May 7, 2017

cmd exec

where creating folders try xyz & ipcongif C:\site\a\t.txt [view]

By: ak45h | Related Lesson: WebApp (part 4) File Inclusion | Modified: May 6, 2017

Metasploit (operation)

  Kali Linux #msfupdate #service postgresql start # service metasploit start # msfconsole (in windows)#cmd #ipconfig (Kali)# msf# help #help route (search internet – metasploit.com) ms08-067 (Kali)# info  exploit/windows/smb/ms08_067_netapi # [view]

By: Oishi | Related Lesson: Metasploit (part 3) Operation | Modified: May 5, 2017

By Passing Antivirus

python -m simpleHttpServer Virus Total [view]

By: sanjaybs | Related Lesson: Advanced Exploitation (part 5) Bypassing Antivirus Software | Modified: May 5, 2017

Metasploit (part 3) Operation

Metasploit tutorial is out-of-date do the following: # /etc/init.d/postgresql start # msfdb init [if not yet initialised database] # msfconsole next do ms08_087 exploit [need Windows 08 emulation to test] we just need to know ip address: in msf: msf& [view]

By: enigma1000 | Related Lesson: Metasploit (part 3) Operation | Modified: May 4, 2017

Metasploit

Kali Linux>  syntax- #cd / usr/share/metasploit-framework #ls #cd modules/ #ls   (written in ruby) #cd exploits/ #ls #cd windows/ #ls #cd smb #ls #cat ms08 (shows module code) # Iceweasel brower> www.exploit-db.com (Verifiy shell code, remove [view]

By: Oishi | Related Lesson: Metasploit (part 2) Fundamentals | Modified: May 3, 2017

Client Side Attacks

msf > use exploit/windows/browser/ms10_002_aurora meterpreter > migrate 3888 meterpreter > show advanced   [view]

By: sanjaybs | Related Lesson: Advanced Exploitation (part 2) Client Side Attacks | Modified: May 3, 2017

nessus

nessus is automatic vernability scanner [view]

By: ak45h | Related Lesson: Vulnerability Scanning (part 2) Nessus | Modified: May 3, 2017

useful commands

cut sort sed  awk sort [view]

By: andris | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: May 2, 2017

« First ‹ Previous 1 45 135 143 144 145 146 147 155 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel