Advanced Penetration Testing Notes

Kali Commands

PWM – Prints Name of Current Working Directory Parameters = -L, -P ls – Lists Directory Contents Parameters = -a, -A, -c, -C, -d [view]

By: sudonemz | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: March 20, 2017

tools

Nmap – sC 192.168.0.56 – oA scriptOutput Execute default scripts… Some ones intrusive /usr/share/nmap/scripts scripts directory [view]

By: galac | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: March 20, 2017

part4 chmod

read write and execute owner = root Root group get read and execute permissions changing permissions??? chmod (review table in slide) =  Need help creating a file in Linux!!!!!! Data Manipulation – nano myfile grep command — stack overfl [view]

By: magdaleneelliott | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: March 19, 2017

rcon-ng

ncon-ng  show modules   use recon/contact-c reds/haveibeenpwned [view]

By: dachef76 | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: March 18, 2017

tools

Nc 192.168…156 80 Get / http/1. 0 Nmap – sV 192.168.0.156 – oA scanone [view]

By: galac | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: March 18, 2017

The Harvester

theharvester get Email by search on the website [view]

By: joelchen | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: March 18, 2017

i dont know what it is

we continue from part 3 that is control PC , but this time we use Auxiliary. what is Auxiliary – https://www.offensive-security.com/metasploit-unleashed/scanner-smb-auxiliary-modules/ type – use auxiliary/scanner/smb/pipe_auditor type &# [view]

By: joelchen | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: March 17, 2017

contorl PC

type – msfconsole type – search ms08-067 type – info exploit/windows/smb/ms08_067_netapi                   (info Payloads) type – use exploit/windows/smb/ms08_067_netapi  type – show options type  [view]

By: joelchen | Related Lesson: Metasploit (part 3) Operation | Modified: March 17, 2017

oko

mlk [view]

By: titouggg | Related Lesson: Metasploit (part 2) Fundamentals | Modified: March 17, 2017

Kali Commands

Tool Manual: man <tool command> [view]

By: yurruki | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: March 17, 2017

« First ‹ Previous 1 69 159 167 168 169 170 171 179 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel