Advanced Penetration Testing Notes

Metasploit (part 2) Fundamentals

Metasploit framework Pretend there is no metasploits…. 1. May not be feasible to code exploit from scratch, depending on complexity, proprietary OS etc…old systems etc.. 2. Can find other people’s code and use but can’t guaran [view]

By: lsec0ni | Related Lesson: Metasploit (part 2) Fundamentals | Modified: January 22, 2017

Programming (part 5) Python Import Command

a simple c prog here. [view]

By: lsec0ni | Related Lesson: Programming (part 5) Python Import Command | Modified: January 22, 2017

Pen Testing Jan22

Kali linux is updated usually on a normal basis so one version can be better then the next one and it depends on the users as well. [view]

By: YacineTabet | Related Lesson: Linux (part 1) | Modified: January 22, 2017

shit

what a shitty tutorial, if you see this, quit it  [view]

By: random003 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: January 22, 2017

Programming (part 4) Python for Port

Simple python port scanner for open or closed #!/usr/bin/python import socket ip = raw_input(”Enter the IP Address:”) port = input(”Enter the port number:”) sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) if sock.conn [view]

By: lsec0ni | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: January 22, 2017

directories, new files and editing software

lets learn about creating file and directory cd /home/sam in the sam directory there will be no file. once we will get inside, we can create a empty file by touch command touch myfile it will create a black file. after that we can create a new direct [view]

By: akabir | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: January 21, 2017

kali basic command and adduser

Pwd command show the working directory man comman show more information about a command. for instance: man pwd man ls ls / command will show all the root label files ls -a -lrt / will show all hidden files and details of each files from the root dire [view]

By: akabir | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: January 21, 2017

Programming (part 3) Network Pings

ping sweep script using bash #!/bin/bash if [ ”$1” == ”” ] then echo ”Usage ./ping.sh [network]” echo ”Example: ./ping.sh 192.168.1” else for x in `seq 1 254` ; do ping -c 1 $1.$x | grep ”64 bytes [view]

By: lsec0ni | Related Lesson: Programming (part 3) Network Pings | Modified: January 21, 2017

Programming (Part 2) Bash Scripting and if/then command

Programming (Part 2) Bash Scripting and if/then command Ping entire network script. [view]

By: lsec0ni | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: January 21, 2017

Copy Commands and Crontab

crontab – automating tasks adding to crontab jobs you would want to run regularly [view]

By: lsec0ni | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: January 21, 2017

« First ‹ Previous 1 86 176 184 185 186 187 188 196 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel