Advanced Penetration Testing Notes

nmap port scaning

zervit software on windows is used for port usingnmap -sV <ip range or adres> -oA <filename> -sV gets the version no. along with other details. -oA saves the results to a file. -p with port range for scaning port range   [view]

By: 574r570rm | Related Lesson: Information Gathering (part 5) NMAP and PortScanning | Modified: September 6, 2017

Vulnerability Scanning (part 3) Nmap

Nmap Script Path—-> usr/share/nmap/scripts nmap –script-help —> it will help to get script information… nmap -sC IP —> useful for information gathering  scanning like nessus nmap –script=nfs-ls IP    [view]

By: dhaval317 | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: September 6, 2017

Linux commands

pwd man pwd man ls [view]

By: atif | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: September 6, 2017

exp

NOP = No operation  go to next instruction    [view]

By: functionsys | Related Lesson: Exploit Development (part 12) Public Exploits and Perl | Modified: September 6, 2017

verifying

BAD character\x00\x0a\x0d\x40 [view]

By: functionsys | Related Lesson: Exploit Development (part 9) Verifying Offsets | Modified: September 6, 2017

exploit development part 5

(gdb ) disassemble overflowed  to view dump of assembler code for function    [view]

By: functionsys | Related Lesson: Exploit Development (part 6) Executing Unintended Code | Modified: September 6, 2017

buffer overflow

gcc -g -fno-stack-protector -o overflowtest overflowtest.c to compiler c file to run it ./overflowtest   AAAAAAAAAAAA   to debugger file using Linux    gdb overflowtest set break point   (gdb) break 14  to run type  run AAAAA then hit enter  [view]

By: functionsys | Related Lesson: Exploit Development (part 4) GNU Compilers | Modified: September 6, 2017

stack

demonstration code in c language about buffer overflow  [view]

By: functionsys | Related Lesson: Exploit Development (part 3) Stack Frame for Function | Modified: September 6, 2017

recon ng google dorksinfo gathering

recon-ngshow modulesuse recon/contacts-creds/haveibeenpwnedset source test@test.comrungoogle dorks exploit-db.com/google-dorks/ [view]

By: 574r570rm | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: September 5, 2017

info gathering techniqs

theharvester maltego shodanhq.comsearch e.g. webcamxp [view]

By: 574r570rm | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: September 5, 2017

« First ‹ Previous 1 84 92 93 94 95 96 104 194 243 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel