Advanced Penetration Testing Notes

chmod, manipulation & packages

a [view]

By: tayd85 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: January 17, 2018

Directories & Files

cp – copy file mv – move file when in VI text editor when you have finished quit INSERT mode an press : then wq to write changes and quit the program cat – concatenate – allows you to create, view files     [view]

By: tayd85 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: January 17, 2018

Linux

#!/bin/bash echo to print something in ” ”(in a script) if syntax if{ ”$1” == ””} then argument fi ($1 means line i command)   [view]

By: Knightabn123 | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: January 17, 2018

Linux Commands

adduser dtaylor – adds user dtaylor su dtaylor – changes active user to dtaylor sud0 – group of users that can pretend to be admin adduser dtaylor sudo – adds dtaylor to sudo group     [view]

By: tayd85 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: January 17, 2018

M4: Auxiliary

use auxiliary/scanner/smb/pipe_auditor show options  set RHOST 192.168.76  run or exploit   [view]

By: Robert Clithero | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: January 16, 2018

Metasploit3: Operations

service postgresql start service metasploit start msfconsole help search ms08-067 info exploit/windows/smb/ms08_067_netapi   use exploit/windows/smb/ms08_067_netapi show options  set RHOST 192.168.1.76 show targets show options show payload set pa [view]

By: Robert Clithero | Related Lesson: Metasploit (part 3) Operation | Modified: January 16, 2018

Programming5: Python Import Command

nano cprogram.c #include <stdio.h> int main(int argc, char *argv[]) {                       if (argc < 2)                       {                                    printf(”%s\n”, ”P [view]

By: Robert Clithero | Related Lesson: Programming (part 5) Python Import Command | Modified: January 16, 2018

Programming4: Python for Port Scanning

nano python.py which python use your bin/python nano python.py We will see if a port is open or closed: #!/usr/bin/python  import socket  python connect_ex #!/usr/bin/python import socket ip = raw_inpu(”Enter the IP address: ”) port = i [view]

By: Robert Clithero | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: January 16, 2018

Programming3: Network

nano ping.sh What if they do have  a command argument? we add else: then echo ”Usage: ./ping.sh [network]” echo ”Example: ./ping.sh 192.168.1” else   fi we going to add what’s called a ”for loop”: then echo [view]

By: Robert Clithero | Related Lesson: Programming (part 3) Network Pings | Modified: January 16, 2018

Programming

Bash scripting Python scriptying and some C ”don’t need to know them, the only time you need them is for exploits development section and I make it pretty easy one you. All you do is exploit skeleton and you just have to fill in the exp [view]

By: Robert Clithero | Related Lesson: Programming (part 1) Fundamentals for Pen Testers | Modified: January 16, 2018

« First ‹ Previous 1 33 41 42 43 44 45 53 143 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel