Advanced Penetration Testing Notes

Part 4

(Part 4: GNU Compilers) (On Ubuntu VM): cat overflowtest.c gcc -g -fno-stack-protector -o overflowtest overflowtest.c ./overflowtest AAAA ./overflowtest AAAAAAAAAAAAAAAAAAA gdb overflowtest After (gdb), type list 1,16 (gdb) break 14 (gdb) break 10 (g [view]

By: GrapeApe561 | Related Lesson: Exploit Development (part 4) GNU Compilers | Modified: March 31, 2018

vulnerablity scanning2

service postqresql start service metaspoilt start msfconsole use auxiliary/scanner/ftp/anonymous show options  set RHOST or RHOSTS 192.12341 192.123412 exploit or run check to check the target either he is vulnerable or not [view]

By: Musaid | Related Lesson: Vulnerability Scanning (part 4) Metasploit | Modified: March 31, 2018

Nmap vulnerability

cd /usr/share/nmap/scripts nmap –script-help default or smb-check-vulns or nfs-ls nmap -sC 192.12923213 192.123.231 -oA script output nmap –script=nfs-ls 192.1923423432     [view]

By: Musaid | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: March 31, 2018

Linux introduction

*NO NOTES* [view]

By: | Related Lesson: Linux (part 1) | Modified: March 31, 2018

vulnerbilty scanning

service nessusd start website     [view]

By: Musaid | Related Lesson: Vulnerability Scanning (part 2) Nessus | Modified: March 31, 2018


zervit.exe on a windows virtual machine 3232 — nc 192.16888341231 (portNumber) — nc -v 192391934 (portNumber like 80) — nmap -sS 1923944134 1923241234 -oA classscan  you can do 2 hosts nmap don’t scan all ports just the most [view]

By: Musaid | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: March 30, 2018


recon-ng show modules use recon/contacts-creds/haveibeenpwned (email dump) set source run — google dorks       [view]

By: Musaid | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: March 30, 2018

information gathering

theharvester -d -l 500 -b all -l for limit -b for sources —– — maltego —- shodan …..   [view]

By: Musaid | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: March 30, 2018


nslookup set type=mx or ns ——— host -t ns host -l ——– host -t ns host -l hkjhkjhyffjhguyfuyf ——- nslookup [view]

By: Musaid | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: March 29, 2018

file permission

chmod = file permission changer 7 = full permissionexample:___________________________________Root@kali-: chmod 750 myfile  7 is root permission, the other two is others.root here has full permission to ”read, write, execute”Second grou [view]

By: alpharoot | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: March 29, 2018

« First ‹ Previous 1 5 6 7 8 9 17 107 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?