08 2020 档案

摘要:Common Attack Techniques Common Attack Techniques Some Windows exploits can be run in Linux Cross-compiling code Compile exploit for another OS https: 阅读全文
posted @ 2020-08-27 21:02 晨风_Eric 阅读(132) 评论(0) 推荐(0) 编辑
摘要:Prioritization of vulnerabilities LEVERAGE INFORMATION Leveraging information to prepare for exploitation Map vulnerabilities to potential exploits Lo 阅读全文
posted @ 2020-08-26 23:09 晨风_Eric 阅读(85) 评论(0) 推荐(0) 编辑
摘要:Nmap Timing and Performance Options Nmap cheat sheat https://www.stationx.net/nmap-cheat-sheet/ nmap -A -p 21 -T4 10.0.0.0/24 QUICK REVIEW Understand 阅读全文
posted @ 2020-08-25 21:21 晨风_Eric 阅读(73) 评论(0) 推荐(0) 编辑
摘要:Target Considerations Given a scenario, perform a vulnerability scan. CONTRAINER Lightweight instance of a VM Runs on to of host OS Docker, Puppet, Va 阅读全文
posted @ 2020-08-14 22:21 晨风_Eric 阅读(94) 评论(0) 推荐(0) 编辑
摘要:Openvas - Greenbone Security Manager Virtual Machine Download the image and installed a standalone Virtual Machine is a easier and faster method. Step 阅读全文
posted @ 2020-08-14 21:39 晨风_Eric 阅读(114) 评论(0) 推荐(0) 编辑
摘要:OpenVAS(1) Official site: https://www.openvas.org/ https://github.com/greenbone/openvas/blob/master/INSTALL.md Install perquisites on Kali: https://ww 阅读全文
posted @ 2020-08-13 21:59 晨风_Eric 阅读(109) 评论(0) 推荐(0) 编辑
摘要:Vulnerability Scanning VULNERABILITY SCAN Structured approach to examining targets to identify known weaknesses Many different types Determine if any 阅读全文
posted @ 2020-08-06 22:48 晨风_Eric 阅读(117) 评论(0) 推荐(0) 编辑
摘要:Application and Open-Source Resources DECOMPILATION Complier - translates source code into executable instructions Decompiler - attempts to convert ex 阅读全文
posted @ 2020-08-02 21:17 晨风_Eric 阅读(112) 评论(0) 推荐(0) 编辑
摘要:Packet Investigation PACKET INVESTIGATION Packet crafting Creating specific network packets to gather information or carry out attacks Tools - netcat, 阅读全文
posted @ 2020-08-02 16:44 晨风_Eric 阅读(70) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示