随笔分类 -  学问

上一页 1 ··· 6 7 8 9 10 11 12 13 下一页
摘要:DICTIONARIES Similar to lists but use key instead of an index. LISTS List of values/elements, all can be stored in one variable. Improving the Program 阅读全文
posted @ 2019-08-17 00:10 晨风_Eric 阅读(250) 评论(0) 推荐(0)
摘要:NETWORK_SCANNER Discover all devices on the network. Display their IP address. Display their MAC address. Write the Python code using the scapy.all mo 阅读全文
posted @ 2019-08-11 11:50 晨风_Eric 阅读(230) 评论(0) 推荐(0)
摘要:SIMPLE ALGORITHM Goal -> Check if MAC address was changed. Steps: 1. Execute and read ifconfig. 2. Read the mac address from the output. 3. Check if M 阅读全文
posted @ 2019-08-11 10:53 晨风_Eric 阅读(223) 评论(0) 推荐(0)
摘要:FUNCTIONS Set of instructions to carry out a task. Can take input, and return a result. Make the code clearer, reusable, and more abstract. input() fu 阅读全文
posted @ 2019-08-11 09:34 晨风_Eric 阅读(210) 评论(0) 推荐(0)
摘要:MAC ADDRESS Media Access Control Permanent Physical Unique Assigned by manufacturer Permanent Physical Unique WHY CHANGE THE MAC ADDRESS 1.Increase an 阅读全文
posted @ 2019-08-11 00:39 晨风_Eric 阅读(308) 评论(0) 推荐(0)
摘要:The Lab and Needed Software Attacker Machine - Kali Linux https://www.kali.org/ 1. Install the software terminator, which is very useful for multi-tas 阅读全文
posted @ 2019-08-10 22:12 晨风_Eric 阅读(136) 评论(0) 推荐(0)
摘要:What is Hacking? Gaining unauthorized access. Hackers? 1.Black-hat Hackers 2.White-hat Hackers 3.Grey-hat Hackers WHAT IS A PROGRAM? A set of instruct 阅读全文
posted @ 2019-08-10 20:22 晨风_Eric 阅读(170) 评论(0) 推荐(0)
摘要:Password Sniffing with Scapy 1. Download and install the Scapy first. https://scapy.net/ 2. Target Website https://aavtrain.com/index.asp 3. Write the 阅读全文
posted @ 2019-08-10 12:35 晨风_Eric 阅读(260) 评论(0) 推荐(0)
摘要:Socket Programming 1. Scan the target Vulnerable Server. And test it by telnet. 2. Write the scanner source code. 3. Execute the code. And the result 阅读全文
posted @ 2019-08-09 23:22 晨风_Eric 阅读(222) 评论(0) 推荐(0)
摘要:Security Header website: https://securityheaders.com/ Scan the target website: https://www.hackthissite.org/ Write the Python Source Code: Execute Res 阅读全文
posted @ 2019-08-07 22:56 晨风_Eric 阅读(211) 评论(0) 推荐(0)
摘要:Preparation: Python Libray in the following programming: 1. Requests Document: https://2.python-requests.org//en/master/ 2. Beautiful Soup Documentati 阅读全文
posted @ 2019-08-06 22:58 晨风_Eric 阅读(385) 评论(0) 推荐(0)
摘要:SickOS 1.2 Walkthrough Preparation: Down load the SickOS virtual machines from the following website: https://www.vulnhub.com/entry/sickos-12,144/ 1. 阅读全文
posted @ 2019-08-04 22:03 晨风_Eric 阅读(376) 评论(0) 推荐(0)
摘要:DroopyCTF Walkthrough Preparation: Download the DroopyCTF virtual machine from the following website: https://www.vulnhub.com/entry/droopy-v02,143/ 1. 阅读全文
posted @ 2019-08-04 16:14 晨风_Eric 阅读(570) 评论(0) 推荐(0)
摘要:BTRSys v2.1 Walkthrough Preparation: Download the BTRSys virtual machine from the following website: https://www.vulnhub.com/entry/btrsys-v21,196/ 1. 阅读全文
posted @ 2019-08-04 11:54 晨风_Eric 阅读(446) 评论(0) 推荐(0)
摘要:Kioptrix Level 1.1 Walkthrough Preparation: Download the virtual machine from the following website: https://www.vulnhub.com/entry/kioptrix-level-11-2 阅读全文
posted @ 2019-08-03 19:53 晨风_Eric 阅读(11277) 评论(0) 推荐(0)
摘要:Pivoting 1. Edit the virtual network settings of the Vmware. 2. Set the Network Adapter(s) of Kali Linux, IE8-Win7 and Kioptrix Level 1 as showed in t 阅读全文
posted @ 2019-07-31 09:27 晨风_Eric 阅读(235) 评论(0) 推荐(0)
摘要:Post-Exploit Password Attacks 1. Crack using the tool - john (Too slow in real world) Locate the rockyou file. Conbine the files and save as unshadow. 阅读全文
posted @ 2019-07-30 23:38 晨风_Eric 阅读(272) 评论(0) 推荐(0)
摘要:Windows Post Exploitation Target Server: IE8-Win 7 VM 1. Download and upload the fgdump, PwDump7, wce and netcat into the IEUser folder on Windows 7. 阅读全文
posted @ 2019-07-30 21:33 晨风_Eric 阅读(198) 评论(0) 推荐(0)
摘要:Linux Post Exploitation Target Sever: Kioptrix Level 1 1. Search the payloads types. All the payload type in Metasploit are showing as below: 2.Try to 阅读全文
posted @ 2019-07-29 23:19 晨风_Eric 阅读(2245) 评论(0) 推荐(0)
摘要:Privilege Escalation Download the Basic-penetration testing virtual machine from the following website: https://www.vulnhub.com/entry/basic-pentesting 阅读全文
posted @ 2019-07-29 13:12 晨风_Eric 阅读(33509) 评论(0) 推荐(0)

上一页 1 ··· 6 7 8 9 10 11 12 13 下一页