Advanced Penetration Testing Notes

Gaterinf

nmap, muy cauteloso: haciendo TCP SYN Scan. Ver Nmap.org Nmap, especificar puertos altos ejemplo -p 3232 de VMware porque si  k no los ve en los primeros mil explorados. comando : nmap -sV 192.168.1.76 -oA classversion    ver la web para técnica [view]

By: rperaltad | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: January 16, 2017

Gathering

Operadores de Google, google Dorks. . recon : para obtener info del entorno de la víctima, emails, subdominios, cargos, etc… Dorks: exploit-db.com/Google-dorks [view]

By: rperaltad | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: January 16, 2017

Gathering

The harvester, para sacar mails de un dominio . Netcraft.com para ver toda la info pública de un dominio web, ejemplo Wordpress version ver.   maltego, para ver visualmente conceptos de red y recursos. Ejemplo mails asociados a un dominio, también [view]

By: rperaltad | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: January 16, 2017

Previous Exp

Yo Bro, Ur Linux Skills Are Now Useful [view]

By: scofieldzg | Related Lesson: Linux (part 1) | Modified: January 16, 2017

sam win 7

cd ../windows/system32/config/ bkhive SYSTEM $HOME/syskey.txt samdump2 SAM syskey.txt [view]

By: 4nzu | Related Lesson: Passwords (part 1) Password Attacks | Modified: January 16, 2017

ssh

copiare da .ssh authorized_keys ssh-add   showmount -e <ip> mount -t nfs -o locks <ip>:/percorso/   [view]

By: 4nzu | Related Lesson: Exploitation (part 6) Attaching to an IP Address | Modified: January 16, 2017

ftp

secure ftp rep backdoor 2.3.4 log via ftp nv port 6200 [view]

By: 4nzu | Related Lesson: Exploitation (part 5) Using Backdoor to Access an FTP Server | Modified: January 16, 2017

dns

nslookup: set type-mx means to set type as mail server set type-ns means to set type as name server whois, dig and host also work well. host: -t is type, such as ns or mx -l for domain/zone transfer, then domain, then nameserver   [view]

By: Keegan Kuhn | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: January 14, 2017

msfvenom

msfvenom creates payloads and can encode them. Syntax: -p ::: payload, and then its location -o ::: options Set LHOST=[IP] Set LPORT-4444 –help-formats shows formats -f for format, and then format > and then filename, such as meterpreter.exe [view]

By: Keegan Kuhn | Related Lesson: Metasploit (part 6) msfvenom | Modified: January 14, 2017

Pyton: Ping al puerto

ver en wireshark como circula el protocolo al ejecutar el script [view]

By: rperaltad | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: January 13, 2017

« First ‹ Previous 1 91 181 189 190 191 192 193 201 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel