Advanced Penetration Testing Notes

ARP

ARP convert IP address to MAC address ARP spoofing #arpspoof  -i eth0 -t target-ip spoofed-ip packetforwardinginfo  cat /proc/sys/net/ipv4/ip_forward (view)echo 1 > /proc/sys/net/ipv4/ip_forward (modify info)     [view]

By: El-spark | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: December 5, 2016

Kali Linux - 6 basic chapters

 https://www.cybrary.it/video/linux-part-1/ https://www.cybrary.it/video/linux-part-2/ https://www.cybrary.it/video/linux-part-3/ https://www.cybrary.it/video/linux-part-4/ https://www.cybrary.it/video/linux-part-5/ https://www.cybrary.it/video/linu [view]

By: Hannu Hirvonen | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: December 5, 2016

traffic capture using wireshark

using wireshark to analyze and capture traffic!! open tab-capture-select interface and start turnoff promiscuous mode so we see only traffic in our machine. you can filter using the filter search-box ip src==ipadd || ip dst==ip   [view]

By: El-spark | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: December 5, 2016

crontab

ls | grep cron  nano crontab – za obavljanje zadataka automatski [view]

By: Nik | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: November 29, 2016

Password attacks

hashdump=  password hashes. save them to file [view]

By: ironreaper2 | Related Lesson: Passwords (part 1) Password Attacks | Modified: November 24, 2016

password cracking tools

bkhive password cracking tool [view]

By: Nathanf | Related Lesson: Passwords (part 1) Password Attacks | Modified: November 21, 2016

system

system($_GET[”cmd”]) (?) [view]

By: anon108 | Related Lesson: Exploitation (part 2) SQL Commands | Modified: November 18, 2016

kali

xyz [view]

By: Amit | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: November 17, 2016

exploit 6

display network file system: in cli ->   showmount -e ’ip’     to export network filesystem mount -t -o noclock nfs ’ip’ :/exportDir /exportlocation     hidden files ls -a .ssh file store keys   co [view]

By: Nathanf | Related Lesson: Exploitation (part 6) Attaching to an IP Address | Modified: November 14, 2016

exploit 6

whoami   =  display which user you are [view]

By: Nathanf | Related Lesson: Exploitation (part 5) Using Backdoor to Access an FTP Server | Modified: November 14, 2016

« First ‹ Previous 1 102 192 200 201 202 203 204 212 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel