Advanced Penetration Testing Notes

Metasploit - part 4 - Auxiliary module

use auxiliary/scanner/smb/pipe_auditor show options set RHOSTS 192.168.220.131 exploit [view]

By: JB | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: July 4, 2016

Metaspoit - part 3 - Operations

if metasploit won’t start use the following command curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \ chmod 755 msfinstall && [view]

By: JB | Related Lesson: Metasploit (part 3) Operation | Modified: July 4, 2016

commands

whois <domain> nslookup <domain> / (set type=(mx,nx)) host -t ns <domain> host -l <domain> <dnshost> fierce -dns <domain>   [view]

By: carlosg2 | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: July 3, 2016

bashh

 for x in ’seq 1 254’ ; do ping -c 1 $1.$x done [view]

By: mahmoud osama | Related Lesson: Programming (part 3) Network Pings | Modified: July 2, 2016

bash

ping.sh   #!/bin/bash if  [ ”$1” == ””] echo hi then fi [view]

By: mahmoud osama | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: July 2, 2016

Metasploit - part 2 - Fundamentals

cd /usr/share/metasploit-framework cd modules = various metasploit modules [view]

By: JB | Related Lesson: Metasploit (part 2) Fundamentals | Modified: July 4, 2016

Programming - part 5 - Python import command

cprogram.c – c is compile language and does not require compiler #includio <stdio.h> = header file; standard input output int main(int argc, char *argv[]) { if (argc < 2) { printf(”%s\n”, ”Pass your name as an argu [view]

By: JB | Related Lesson: Programming (part 5) Python Import Command | Modified: July 2, 2016

Programming - part 4 - Python for Port Scanning

creating python.py script first thing to do is to look for python interpreter which python e.g. /bin/bash/pyhton vi or nano python.py – basic port scanner to see whether port is opened or closed – NICE SCRIPT #!/usr/bin/pyhton im [view]

By: JB | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: July 2, 2016

k

l [view]

By: josias258 | Related Lesson: Passwords (part 1) Password Attacks | Modified: July 2, 2016

Hacking

Beginning [view]

By: josias258 | Related Lesson: Linux (part 1) | Modified: July 2, 2016

« First ‹ Previous 1 133 223 231 232 233 234 235 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel