Advanced Penetration Testing Notes

networking

80 port web server  ip adress  from router  ifconfig  nano /etc/network/interfaces static ip service networking restart (in case u change ) ping 192.168.1.76 talk with  other system netcat nc  nc -lvp 1234     listen locally port incoming c [view]

By: amine.atarboulaich | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: March 17, 2018

chmod

 nano myfile  security conference hackon jan blackhat  feb brucon  aug cat myfile | grep B |  cut -d ” ” -f 2cat myfile | grep B |  cut -d ” ” -f 2 >myfile2 |sort -u apt-get install armitage netstat -antp (listen to s [view]

By: amine.atarboulaich | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: March 17, 2018

files

cp . . /home/amine/myfile mydirectory home/amine/mydirectory/myfile mv myfile /m > overwrite >>add to other writing [view]

By: amine.atarboulaich | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: March 17, 2018

base

exit apart root #adduser amine sudo  sudo   [view]

By: amine.atarboulaich | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: March 17, 2018

Nmap

65535 tcp/udp nmap -sS 192.168.0.14 192.168.0.20 -oA scanfile nmap -sS 192.168.0.14 -p nmap -sU   [view]

By: kaiyre | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: March 17, 2018

SSL stripping

SSL striping: SSL man in the middle. [view]

By: jkam | Related Lesson: Traffic Capture (part 6) SSL Stripping | Modified: March 17, 2018

Capture de trafic avec Ettercap

capture de traffic #ettercap -Ti eth0 -M arp: remote /192.168.1.1/ /192.168.1.76 #nano /proc/sys/net/ipv4/ip_formward Casser la connexion SSL (entre Facebook et le navigateur) # ettercap -Ti eth0 -M arp:remote /192.168.1.1/ /192.168.1.23 il faut reg [view]

By: jkam | Related Lesson: Traffic Capture (part 5) ettercap | Modified: March 17, 2018

capture 4 -DNS trafic

Capture de trafic  DNS DNS translate www.xx.com en une IP adresse. DNS cache poisoning #arpsoof eth0 -i passerelle nano hosts.txt 127.0.0.0.1 www.gmail.com 12 #service apache2 start #dnsspoof -i eth0 -f /root/hosts.txt –> f pour fichier éc [view]

By: jkam | Related Lesson: Traffic Capture (part 4) DNS | Modified: March 17, 2018

capture trafic 3 -ARP

ARP translate &IP en & MAC dit aux hôtes ou envoyer le trafic ARP spoofing #arpspoof-i eth0 -t 192.168.1.76  192.168.1.80 ( -t : target) # cat/proc/sys/net/ipv4/ip_forward #echo 1 > /proc/sys.net/ipv4/ip_forward # arp -a     [view]

By: jkam | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: March 16, 2018

capture trafic -2

Analyse des protocoles réseau # wireshark GUI capture–>interfaces–>eth0–>options –>promsiscuis turn off –>re start mode promiscuis eteint à cause de VM ware? #ping 192.168.1.25 (impression vu sur wiresh [view]

By: jkam | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: March 16, 2018

« First ‹ Previous 1 5 13 14 15 16 17 25 115 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel