Advanced Penetration Testing Notes

#!/bin/bash if  [ ”$1” == ”” ] then echo ” Usage: ./ [network]” echo ”Example: ./ 192.168.1” else for x in {1..254}  ;  do ping -c 1 $1.$x | grep ”64 bytes” | cut -d ” [view]

By: 574r570rm | Related Lesson: Programming (part 3) Network Pings | Modified: August 31, 2017

post exploitation

load incognito list_tokens -u  will give you list of login users you can be admin by typing  impersonate_token domainname\Administrator   in shell greate domain admin  net user ali 1234 /add /domain net groups ”Domain Admins” ali /add [view]

By: functionsys | Related Lesson: Post Exploitation (part 4) Setting Up a Domain Controller | Modified: August 29, 2017


thank yoou [view]

By: johmsmith916 | Related Lesson: Linux (part 3) - Directories, myfile and Nano | Modified: August 29, 2017

jgh – apche – xampp webdav tikiwiki     [view]

By: shikhar77 | Related Lesson: Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto | Modified: August 29, 2017

Metasploit vulnerability scan

If in case you need to select all the love hosts from a file, in this case we are taking the hosts which were pointed out by .NSE. Now, the command would be set RHOSTS file:/root/livehosts.txt   [view]

By: shikhar77 | Related Lesson: Vulnerability Scanning (part 4) Metasploit | Modified: August 29, 2017

NMAP vulnearibilty scanning

NMAP scripting engine cd /usr/share/nmap/scripts nmap –script-help   [view]

By: shikhar77 | Related Lesson: Vulnerability Scanning (part 3) Nmap Scripting Engine | Modified: August 28, 2017


just about Google Hacking Database [view]

By: Puskar Trital | Related Lesson: Information Gathering (part 4) recon-ng and google operators | Modified: August 28, 2017


theharvester -d -l 500 all [view]

By: Puskar Trital | Related Lesson: Information Gathering (part 3) Targeting Email and Maltego | Modified: August 28, 2017


fierce -dns whois nslookup nslookup >set type=mx/ns/cname host -t [view]

By: Puskar Trital | Related Lesson: Information Gathering (part 2) Domain Name Services | Modified: August 28, 2017


needs you tube video for making virus app for both android/pc/ios   [view]

By: Puskar Trital | Related Lesson: Metasploit (part 6) msfvenom | Modified: August 28, 2017

« First ‹ Previous 1 88 96 97 98 99 100 108 198 243 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?