07 2019 档案

摘要:Pivoting 1. Edit the virtual network settings of the Vmware. 2. Set the Network Adapter(s) of Kali Linux, IE8-Win7 and Kioptrix Level 1 as showed in t 阅读全文
posted @ 2019-07-31 09:27 晨风_Eric 阅读(227) 评论(0) 推荐(0) 编辑
摘要:Post-Exploit Password Attacks 1. Crack using the tool - john (Too slow in real world) Locate the rockyou file. Conbine the files and save as unshadow. 阅读全文
posted @ 2019-07-30 23:38 晨风_Eric 阅读(267) 评论(0) 推荐(0) 编辑
摘要:Windows Post Exploitation Target Server: IE8-Win 7 VM 1. Download and upload the fgdump, PwDump7, wce and netcat into the IEUser folder on Windows 7. 阅读全文
posted @ 2019-07-30 21:33 晨风_Eric 阅读(176) 评论(0) 推荐(0) 编辑
摘要:Linux Post Exploitation Target Sever: Kioptrix Level 1 1. Search the payloads types. All the payload type in Metasploit are showing as below: 2.Try to 阅读全文
posted @ 2019-07-29 23:19 晨风_Eric 阅读(2215) 评论(0) 推荐(0) 编辑
摘要:Privilege Escalation Download the Basic-penetration testing virtual machine from the following website: https://www.vulnhub.com/entry/basic-pentesting 阅读全文
posted @ 2019-07-29 13:12 晨风_Eric 阅读(33293) 评论(0) 推荐(0) 编辑
摘要:Metasploit Attack Target Server: IE8 on WinXP 1.Start the Metasploit. 2.Select 2)Website Attack Vectors. 3.Select 1)Java Applet Attack Method. 4.Selec 阅读全文
posted @ 2019-07-24 22:48 晨风_Eric 阅读(247) 评论(0) 推荐(0) 编辑
摘要:Metasploit Target Server: Kioptrix Level 1 (1) Start the Metasploit on Kali Linux. (2) Set the module and options. (3)Exploit the Kioptrix Level 1 ser 阅读全文
posted @ 2019-07-23 23:04 晨风_Eric 阅读(159) 评论(0) 推荐(0) 编辑
摘要:File transfer type: 1. HTTP Transfer files through the website. 2.wget 3.FTP python FTP (1)Install python FTP on the Kali Linux. (2)Move to the target 阅读全文
posted @ 2019-07-22 22:46 晨风_Eric 阅读(227) 评论(0) 推荐(0) 编辑
摘要:Remote File Inclusion[RFI] Prepare: Download the DVWA from the following website and deploy it on your server. http://www.dvwa.co.uk/ Install XAMPP an 阅读全文
posted @ 2019-07-21 18:46 晨风_Eric 阅读(503) 评论(0) 推荐(0) 编辑
摘要:Local File Inclusion[LFI] Target Pentester Lab: Download from the following website: https://www.vulnhub.com/entry/pentester-lab-php-include-and-post- 阅读全文
posted @ 2019-07-20 22:50 晨风_Eric 阅读(297) 评论(0) 推荐(0) 编辑
摘要:SQL Injection[SQLi] Refrence: SQL Injection Authentication Bypass Cheat Sheet https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-c 阅读全文
posted @ 2019-07-20 10:35 晨风_Eric 阅读(227) 评论(0) 推荐(0) 编辑
摘要:Cross-Site Scripting(XSS) 1. Using the tool - netdiscover to find the IP of target server. 2.Browser the website http://10.0.0.21 through Firefox. 3. 阅读全文
posted @ 2019-07-18 23:23 晨风_Eric 阅读(204) 评论(0) 推荐(0) 编辑
摘要:Installing XSS&MySQL FILE Download the Pentester Lab: XSS and MySQL FILE from the following website: https://www.vulnhub.com/entry/pentester-lab-xss-a 阅读全文
posted @ 2019-07-17 23:16 晨风_Eric 阅读(195) 评论(0) 推荐(0) 编辑
摘要:Tool: Metasploit 1. Start the msfconsole tool. 2.Search ssh related modules. 3.Use the "auxiliary/scanner/ssh/ssh_login" module and set the options, s 阅读全文
posted @ 2019-07-16 23:28 晨风_Eric 阅读(180) 评论(0) 推荐(0) 编辑
摘要:Tools: 3. hydra Hydra v8.9.1 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Synt 阅读全文
posted @ 2019-07-16 23:12 晨风_Eric 阅读(265) 评论(0) 推荐(0) 编辑
摘要:Pre-Exploit Password Attacks Tools: 1. ncrack Ncrack 0.6 ( http://ncrack.org )Usage: ncrack [Options] {target and service specification}TARGET SPECIFI 阅读全文
posted @ 2019-07-16 22:56 晨风_Eric 阅读(351) 评论(0) 推荐(0) 编辑
摘要:Antivirus Bypassing Tools: Kali Linux Detection Platform: https://www.virustotal.com/gui/home/upload 1. 2. 3. 阅读全文
posted @ 2019-07-16 22:14 晨风_Eric 阅读(189) 评论(0) 推荐(0) 编辑
摘要:Java Applet Attacks Download virtual machines from the following website: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ 1. Reset the 阅读全文
posted @ 2019-07-07 23:08 晨风_Eric 阅读(260) 评论(0) 推荐(0) 编辑
摘要:Client Side Attacks Tool: setoolkit 1. Start setoolkit on Kali Linux. 2. Select 1) Social-Engineering Attacks 3. Select 2)Website Attack Vectors. 4. S 阅读全文
posted @ 2019-07-07 00:14 晨风_Eric 阅读(149) 评论(0) 推荐(0) 编辑
摘要:Modifying Shellcode 1. Search “vulnserver exploit code” on the Internet. Find the following website: http://sh3llc0d3r.com/vulnserver-trun-command-buf 阅读全文
posted @ 2019-07-06 23:29 晨风_Eric 阅读(304) 评论(0) 推荐(0) 编辑
摘要:Compiling an Exploit Exercise: samba exploit 1. Search and download the samba exploit source code from Exploit Database. https://www.exploit-db.com/ex 阅读全文
posted @ 2019-07-06 18:06 晨风_Eric 阅读(203) 评论(0) 推荐(0) 编辑
摘要:Gaining Root with Metasploit Platform: Kali Linux, Kioptrix Level 1 1. Find the IP of Kioptirx 2. Scan the Kioptrix server and analyst the result. 3. 阅读全文
posted @ 2019-07-06 17:44 晨风_Eric 阅读(285) 评论(0) 推荐(0) 编辑
摘要:Generating Shellcode & Gaining Root 1.Generate the shellcode on Kali Linux. LHOST is the IP of Kali Linux. 2. Write the exploit.py and chmod the 777 r 阅读全文
posted @ 2019-07-01 23:08 晨风_Eric 阅读(245) 评论(0) 推荐(0) 编辑
摘要:Finding the Right Module(mona) Mona Module Project website: https://github.com/corelan/mona 1. Download mona.py, and drop it into the 'OyCommands' fil 阅读全文
posted @ 2019-07-01 22:25 晨风_Eric 阅读(238) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示