Advanced Penetration Testing Notes

Incomplete video, broken tool

sslstrip doesn’t work in this video. All you can learn from it is that you need to arp-spoof, set ip_forward and redirect port 80 traffic. [view]

By: Hoshy | Related Lesson: Traffic Capture (part 6) SSL Stripping | Modified: September 12, 2017

proc

find email addresses on the net: theharvester -d cisco.com -l 500 -b all [view]

By: atif | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: September 10, 2017

scanning metasploit

use auxiliary/scanner/ftp/anonymouscat filename.gnmap | grep Up | cut -d ” ” -f 2 |sort -u > livehosts.txt In Metasploit set RHOSTS file:/root/livehosts.txtrun check (the target is vulnerable)   [view]

By: 574r570rm | Related Lesson: Vulnerability Scanning (part 4) Metasploit | Modified: September 9, 2017

proc

on kali linux: whois meezanbank.com nslookup set type=mx set type=ns set type=a zone transfer: host -t ns bulbsecurity.com host -l bulbsecurity.com ns65.domaincontrols.com host -t ns zonetransfer.me host -l zonetransfer.me nsztm2.digi.ninja fierce -d [view]

By: atif | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: September 9, 2017

proc

cron – automate tasks /etc ls | grep cron service cron restart [view]

By: atif | Related Lesson: Linux (part 6) Copy Commands and crontab | Modified: September 9, 2017

proc

nano etc/network/interfaces service networking restart [view]

By: atif | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: September 9, 2017

proc

chmod +x myfile cat myfile cat myfile | grep : grep looks for a pattern cat myfile | grep atif this will find atif in the file and display the line cat myfile | cut -d ” ” -f 1 cat myfile | grep B | cut -d ” ” f 2 cat myfile [view]

By: atif | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: September 9, 2017

Title of this modules' chapter is wrong

This is not about Python Import command but about basic C programming [view]

By: Hoshy | Related Lesson: Programming (part 5) Python Import Command | Modified: September 9, 2017

comand

host -t ns dyco.co host -l dyco.co ns1.lunarpages.co fierce -dns dyco.co [view]

By: gmahechas | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: September 8, 2017

proc

touch myfile – create new file mkdir cp /home/georgia/myfile /home/georgia/mydir/myfile mv myfile myfile2 change filename from myfile to myfile2 rm myfile remove the file echo hi georgia echo hi georgia > myfile man cat echo hi georgia > [view]

By: atif | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: September 8, 2017

« First ‹ Previous 1 80 88 89 90 91 92 100 190 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 335 / December 14, 2019
How do I Get MTA Certified?
Views: 927 / December 12, 2019
How much does your PAM software really cost?
Views: 1380 / December 10, 2019
How Do I Get into Android Development?
Views: 1758 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel