11 2020 档案

摘要:Other Pen Testing Tools MISCELLANEOUS TOOLS Tool Notes URL Searchploit Search tool for exploit database https://www.exploit-db.com/searchsploit/ Power 阅读全文
posted @ 2020-11-18 20:25 晨风_Eric 阅读(72) 评论(0) 推荐(0) 编辑
摘要:Analyzers and Mobile Pen Testing Tools NETWORKING AND MOBILE TOOLS Tool Notes URL Wireshark Packet sniffer/protocol analyzer https://www.wireshark.org 阅读全文
posted @ 2020-11-18 20:06 晨风_Eric 阅读(85) 评论(0) 推荐(0) 编辑
摘要:Remote Access Tools Tool Notes URL SSH Secure shell Included or available in most OSs NCAT Similar to nc, but from Nmap developers https://nmap.org/nc 阅读全文
posted @ 2020-11-17 20:27 晨风_Eric 阅读(72) 评论(0) 推荐(0) 编辑
摘要:Wireless and Web Pen Testing Tool WIRELESS TOOLS Tool Notes URL Aircrack-NG Monitoring, attacking, testing, cracking https://www.aircrack-ng.org/ Kism 阅读全文
posted @ 2020-11-16 18:11 晨风_Eric 阅读(72) 评论(0) 推荐(0) 编辑
摘要:Open-Source Research Tools OPEN SOURCE INTELLIGENCE (OSINT) TOOLS Tool Notes URL Whois Domain details (contacts, name servers, etc.) https://whois.ica 阅读全文
posted @ 2020-11-16 17:20 晨风_Eric 阅读(59) 评论(0) 推荐(0) 编辑
摘要:Code cracking tools Debuggers Tool Notes URL OLLYDBG Windows 32-bit http://www.ollydbg.de/ Immunity debugger Write exploits, analyze malware, and reve 阅读全文
posted @ 2020-11-14 21:52 晨风_Eric 阅读(71) 评论(0) 推荐(0) 编辑
摘要:Scanners and credential tools Scanners Tool Notes URL Nikto Web server vulnerability scanner https://github.com/sullo/nikto OpenVAS(Open Vulnerability 阅读全文
posted @ 2020-11-12 22:10 晨风_Eric 阅读(65) 评论(0) 推荐(0) 编辑
摘要:Using Kali Linux Kali Tools Listings https://tools.kali.org/tools-listing QUICK REVIEW Kali Linux is only one open-source Linux distribution targeted 阅读全文
posted @ 2020-11-08 20:32 晨风_Eric 阅读(87) 评论(0) 推荐(0) 编辑
摘要:Pen Testing Toobox RECONNAISSANCE For reconnaissance, use: Nmap Whois Nslooup Theharvester Shodan Recon-NG Censys Aircrack-NG Kismet WiFite SET Wiresh 阅读全文
posted @ 2020-11-05 20:32 晨风_Eric 阅读(136) 评论(0) 推荐(0) 编辑
摘要:Nmap Scoping and Output Options NMAP nmap(Network Mapper) One of the most common and most useful tools for reconnaissance nmap -A does much of what we 阅读全文
posted @ 2020-11-04 21:55 晨风_Eric 阅读(153) 评论(0) 推荐(0) 编辑
摘要:Persistence and Stealth PERSISTENCE Scheduled jobs Cron or Task Manager Scheduled Task Same as above Daemons Background processes or services Back doo 阅读全文
posted @ 2020-11-03 21:30 晨风_Eric 阅读(43) 评论(0) 推荐(0) 编辑
摘要:Post-exploitation Techniques POST-EXPLOITATION TECHNIQUES What to do once you're in Make it easier next time Lateral movement RPC/DCOM (Remote Procedu 阅读全文
posted @ 2020-11-03 20:47 晨风_Eric 阅读(57) 评论(0) 推荐(0) 编辑
摘要:Physical Security PHYICAL SECURITY RELATED TO FACILITIES Piggybacking/tailgating - unauthorized person following an authorized person through a physic 阅读全文
posted @ 2020-11-01 20:37 晨风_Eric 阅读(32) 评论(0) 推荐(0) 编辑
摘要:Miscellaneous Local Host Vulnerabilities LOCAL HOST VULNERABILITIES Default account settings - disable accounts that are not being used. Sandbox escap 阅读全文
posted @ 2020-11-01 19:21 晨风_Eric 阅读(55) 评论(0) 推荐(0) 编辑
摘要:Miscellaneous privilege escalation EXPLOITABLE SERVICES Unquoted service paths Allow abbreviated attack paths(without spaces) PRIVILEGE ESCALATION Uns 阅读全文
posted @ 2020-11-01 17:53 晨风_Eric 阅读(38) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示