02 2020 档案

摘要:Interacting with Metasploit msf.go package rpc import ( "bytes" "fmt" "gopkg.in/vmihailenco/msgpack.v2" "net/http" ) // Build the Go types to handle b 阅读全文
posted @ 2020-02-26 23:46 晨风_Eric 阅读(135) 评论(0) 推荐(0) 编辑
摘要:Interacting with Metasploit Early-stage Preparation: Setting up your environment - start the Metasploit console as well as the RPC listener through th 阅读全文
posted @ 2020-02-25 22:14 晨风_Eric 阅读(118) 评论(0) 推荐(0) 编辑
摘要:Building an HTTP Client That Interacts with Shodan Shadon(URL:https://www.shodan.io/) is the world's first search engine for Internet-connected device 阅读全文
posted @ 2020-02-23 19:04 晨风_Eric 阅读(220) 评论(0) 推荐(0) 编辑
摘要:Building HTTP Clients that interact with a variety of security tools and resources. Basic Preparation: Go's net/HTTP standard package contains several 阅读全文
posted @ 2020-02-23 15:22 晨风_Eric 阅读(114) 评论(0) 推荐(0) 编辑
摘要:Building a TCP Proxy Using io.Reader and io.Writer Essentially all input/output(I/O). package main import ( "fmt" "log" "os" ) // FooReader defines an 阅读全文
posted @ 2020-02-22 22:09 晨风_Eric 阅读(291) 评论(0) 推荐(0) 编辑
摘要:Simple Port Scanner with Golang Use Go‘s net package: net.Dial(network, address string) package main import ( "fmt" "net" ) func main() { _, err := ne 阅读全文
posted @ 2020-02-22 16:32 晨风_Eric 阅读(287) 评论(0) 推荐(0) 编辑
摘要:Preparation of the Lab Environment: Download and Install Pan-OS from the following website https://docs.gns3.com/appliances/pan-vm-fw.html or https:// 阅读全文
posted @ 2020-02-15 16:02 晨风_Eric 阅读(244) 评论(0) 推荐(0) 编辑
摘要:OWASP ZAP(ZED ATTACK PROXY) Automatically find vulnerabilities in web applications. Free and easy to use. It can also be used for manual testing. This 阅读全文
posted @ 2020-02-10 21:15 晨风_Eric 阅读(91) 评论(0) 推荐(0) 编辑
摘要:XSS VULNS XSS - CROSS SITE SCRIPTING VULNS Allow an attacker to inject javascript code into the page. The code is executed when the page loads. The co 阅读全文
posted @ 2020-02-10 20:38 晨风_Eric 阅读(130) 评论(0) 推荐(0) 编辑
摘要:SQL INJECTION Preventing SQLi Filters can be bypassed. Use a blacklist of commands? Still can be bypassed. Use whitelist? Same issue. -> Use parameter 阅读全文
posted @ 2020-02-09 21:11 晨风_Eric 阅读(160) 评论(0) 推荐(0) 编辑
摘要:SQL INJECTION SQLMAP Tool designed to exploit SQL injections. Works with many DB types, MySQL, MSSQL ...etc. >sqlmap --help >sqlmap -u [target URL] Fo 阅读全文
posted @ 2020-02-09 20:55 晨风_Eric 阅读(246) 评论(0) 推荐(0) 编辑
摘要:SQL INJECTION Discovering SQLi in GET Inject by browser URL. Selecting Data From Database Change the number to a big one, then you can get a useful er 阅读全文
posted @ 2020-02-09 17:41 晨风_Eric 阅读(120) 评论(0) 推荐(0) 编辑
摘要:SQL INJECTIONWHAT IS SQL?Most websites use a database to store data.Most data stored in it(usernames, passwords ..etc.)Web application reads, updates and inserts data in the database.Interaction with ... 阅读全文
posted @ 2020-02-09 16:36 晨风_Eric 阅读(96) 评论(0) 推荐(0) 编辑
摘要:VULNS MITIGATION 1. File Upload Vulns - Only allow safe files to be updated. 2. Code Execution Vulns: Don't use dangerous functions. Filter use input 阅读全文
posted @ 2020-02-08 12:37 晨风_Eric 阅读(101) 评论(0) 推荐(0) 编辑
摘要:REMOTE FILE INCLUSION Similar to local file inclusion. But allows an attacker to read ANY file from ANY server. Execute PHP files from other servers o 阅读全文
posted @ 2020-02-07 22:08 晨风_Eric 阅读(137) 评论(0) 推荐(0) 编辑
摘要:LOCAL FILE INCLUSION Allows an attacker to read ANY file on the same server. Access files outside www directory. Try to read /etc/passwd file. 1. We k 阅读全文
posted @ 2020-02-07 21:33 晨风_Eric 阅读(146) 评论(0) 推荐(0) 编辑
摘要:CODE EXECUTION VULNS Allows an attacker to execute OS commands. Windows or Linux commands. Can be used to get a reverse shell. Or upload any file usin 阅读全文
posted @ 2020-02-07 20:57 晨风_Eric 阅读(99) 评论(0) 推荐(0) 编辑
摘要:EXPLOITATION -File Upload VULNS Simple type of vulnerabilities. Allow users to upload executable files such as PHP. Upload a PHP shell or backdoor, ex 阅读全文
posted @ 2020-02-07 20:28 晨风_Eric 阅读(88) 评论(0) 推荐(0) 编辑
摘要:INFORMATION GATHERING IP address. Domain name Info. Technologies used. Other websites on the same server. DNS records. Unlisted files, sub-domains, di 阅读全文
posted @ 2020-02-07 16:57 晨风_Eric 阅读(175) 评论(0) 推荐(0) 编辑
摘要:How to hack a website? An application installed on a computer. ->web application pen-testing A computer uses an OS + Other applications -> server-side 阅读全文
posted @ 2020-02-07 14:45 晨风_Eric 阅读(125) 评论(0) 推荐(0) 编辑
摘要:PIVOTING Use the hacked device as a pivot. Try to gain access to other devices in the network. Tool: Metasploit - AUTOROUTE Module Target: Metasploita 阅读全文
posted @ 2020-02-07 14:29 晨风_Eric 阅读(143) 评论(0) 推荐(0) 编辑
摘要:Spying - Capturing Key Strikes & Taking Screen Shots Log all mouse/keyboard events > keyscan-start - show current working directory > keyscan-dump - l 阅读全文
posted @ 2020-02-06 20:04 晨风_Eric 阅读(83) 评论(0) 推荐(0) 编辑
摘要:MAINTAINING ACCESS - Methods 1. Using a veil-evasion Rev_http_service Rev_tcp_service Use it instead of a normal backdoor. Or upload and execute from 阅读全文
posted @ 2020-02-06 19:50 晨风_Eric 阅读(117) 评论(0) 推荐(0) 编辑
摘要:METERPRETER BASICS >help - shows help >background - backgrounds current session >sessions -I - lists all sessions >session -i - interact with a certai 阅读全文
posted @ 2020-02-06 17:34 晨风_Eric 阅读(123) 评论(0) 推荐(0) 编辑
摘要:CLIENT SIDE ATTACKS - Detecting Trojan manually or using a sandbox Analyzing trojans Check the properties of the file. The file type of a trojan is ap 阅读全文
posted @ 2020-02-06 14:33 晨风_Eric 阅读(93) 评论(0) 推荐(0) 编辑
摘要:CLIENT SIDE ATTACK - BeEF Framework Hooking targets using MITMF Tools: MITMF and BeEF Start BeEF and execute the following commands: python2 mitmf.py 阅读全文
posted @ 2020-02-06 12:44 晨风_Eric 阅读(81) 评论(0) 推荐(0) 编辑
摘要:CLIENT SIDE ATTACKS - BeEf Framework Browser Exploitation Framework allowing us to launch a number of attacks on a hooked target. Targets are hooked o 阅读全文
posted @ 2020-02-05 13:06 晨风_Eric 阅读(115) 评论(0) 推荐(0) 编辑
摘要:CLIENT SIDE ATTACKS - Trojan delivery method - using email spoofing Use gathered info to contract targets. (e.g. Maltego, Google ... etc.) Send an ema 阅读全文
posted @ 2020-02-05 08:21 晨风_Eric 阅读(81) 评论(0) 推荐(0) 编辑
摘要:CLIENT SIDE ATTACKS - Spoofing backdoor extension Change the extension of the trojan from exe to a suitable one. Make the trojan even more trustable. 阅读全文
posted @ 2020-02-05 07:59 晨风_Eric 阅读(86) 评论(0) 推荐(0) 编辑
摘要:Creating disk space usage quotas: File Screening Generate Storage Report, including file edit audit. You can configure a scheduled report here. 阅读全文
posted @ 2020-02-04 21:17 晨风_Eric 阅读(164) 评论(0) 推荐(0) 编辑
摘要:Windows Server Update Services Configuration Wizard: Approve procedure of these updates is very tiring and time consuming. The simple way to do this i 阅读全文
posted @ 2020-02-04 18:33 晨风_Eric 阅读(250) 评论(0) 推荐(0) 编辑
摘要:For Windows Update, the limitation normally is a time window, disk space, network bandwidth. Create a GPO - Windows Update Configuration 阅读全文
posted @ 2020-02-02 12:26 晨风_Eric 阅读(171) 评论(0) 推荐(0) 编辑
摘要:Delegate proper right to some user: Login/Logout Audit - GPO Setting - Event Viewer File Auditing Modify audit settings of the folder. 阅读全文
posted @ 2020-02-01 23:08 晨风_Eric 阅读(148) 评论(0) 推荐(0) 编辑
摘要:Windows Admin Center: https://www.microsoft.com/en-us/evalcenter/evaluate-windows-admin-center Remote Server Administration Tools for Windows 10 https 阅读全文
posted @ 2020-02-01 22:24 晨风_Eric 阅读(136) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示