随笔分类 -  学问

上一页 1 ··· 7 8 9 10 11 12 13 下一页
摘要:Metasploit Attack Target Server: IE8 on WinXP 1.Start the Metasploit. 2.Select 2)Website Attack Vectors. 3.Select 1)Java Applet Attack Method. 4.Selec 阅读全文
posted @ 2019-07-24 22:48 晨风_Eric 阅读(255) 评论(0) 推荐(0)
摘要:Metasploit Target Server: Kioptrix Level 1 (1) Start the Metasploit on Kali Linux. (2) Set the module and options. (3)Exploit the Kioptrix Level 1 ser 阅读全文
posted @ 2019-07-23 23:04 晨风_Eric 阅读(162) 评论(0) 推荐(0)
摘要:File transfer type: 1. HTTP Transfer files through the website. 2.wget 3.FTP python FTP (1)Install python FTP on the Kali Linux. (2)Move to the target 阅读全文
posted @ 2019-07-22 22:46 晨风_Eric 阅读(233) 评论(0) 推荐(0)
摘要:Remote File Inclusion[RFI] Prepare: Download the DVWA from the following website and deploy it on your server. http://www.dvwa.co.uk/ Install XAMPP an 阅读全文
posted @ 2019-07-21 18:46 晨风_Eric 阅读(524) 评论(0) 推荐(0)
摘要:Local File Inclusion[LFI] Target Pentester Lab: Download from the following website: https://www.vulnhub.com/entry/pentester-lab-php-include-and-post- 阅读全文
posted @ 2019-07-20 22:50 晨风_Eric 阅读(307) 评论(0) 推荐(0)
摘要:SQL Injection[SQLi] Refrence: SQL Injection Authentication Bypass Cheat Sheet https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-c 阅读全文
posted @ 2019-07-20 10:35 晨风_Eric 阅读(236) 评论(0) 推荐(0)
摘要:Cross-Site Scripting(XSS) 1. Using the tool - netdiscover to find the IP of target server. 2.Browser the website http://10.0.0.21 through Firefox. 3. 阅读全文
posted @ 2019-07-18 23:23 晨风_Eric 阅读(211) 评论(0) 推荐(0)
摘要:Installing XSS&MySQL FILE Download the Pentester Lab: XSS and MySQL FILE from the following website: https://www.vulnhub.com/entry/pentester-lab-xss-a 阅读全文
posted @ 2019-07-17 23:16 晨风_Eric 阅读(200) 评论(0) 推荐(0)
摘要:Tool: Metasploit 1. Start the msfconsole tool. 2.Search ssh related modules. 3.Use the "auxiliary/scanner/ssh/ssh_login" module and set the options, s 阅读全文
posted @ 2019-07-16 23:28 晨风_Eric 阅读(184) 评论(0) 推荐(0)
摘要:Tools: 3. hydra Hydra v8.9.1 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Synt 阅读全文
posted @ 2019-07-16 23:12 晨风_Eric 阅读(268) 评论(0) 推荐(0)
摘要:Pre-Exploit Password Attacks Tools: 1. ncrack Ncrack 0.6 ( http://ncrack.org )Usage: ncrack [Options] {target and service specification}TARGET SPECIFI 阅读全文
posted @ 2019-07-16 22:56 晨风_Eric 阅读(363) 评论(0) 推荐(0)
摘要:Antivirus Bypassing Tools: Kali Linux Detection Platform: https://www.virustotal.com/gui/home/upload 1. 2. 3. 阅读全文
posted @ 2019-07-16 22:14 晨风_Eric 阅读(194) 评论(0) 推荐(0)
摘要:Java Applet Attacks Download virtual machines from the following website: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ 1. Reset the 阅读全文
posted @ 2019-07-07 23:08 晨风_Eric 阅读(270) 评论(0) 推荐(0)
摘要:Client Side Attacks Tool: setoolkit 1. Start setoolkit on Kali Linux. 2. Select 1) Social-Engineering Attacks 3. Select 2)Website Attack Vectors. 4. S 阅读全文
posted @ 2019-07-07 00:14 晨风_Eric 阅读(153) 评论(0) 推荐(0)
摘要:Modifying Shellcode 1. Search “vulnserver exploit code” on the Internet. Find the following website: http://sh3llc0d3r.com/vulnserver-trun-command-buf 阅读全文
posted @ 2019-07-06 23:29 晨风_Eric 阅读(325) 评论(0) 推荐(0)
摘要:Compiling an Exploit Exercise: samba exploit 1. Search and download the samba exploit source code from Exploit Database. https://www.exploit-db.com/ex 阅读全文
posted @ 2019-07-06 18:06 晨风_Eric 阅读(207) 评论(0) 推荐(0)
摘要:Gaining Root with Metasploit Platform: Kali Linux, Kioptrix Level 1 1. Find the IP of Kioptirx 2. Scan the Kioptrix server and analyst the result. 3. 阅读全文
posted @ 2019-07-06 17:44 晨风_Eric 阅读(288) 评论(0) 推荐(0)
摘要:Generating Shellcode & Gaining Root 1.Generate the shellcode on Kali Linux. LHOST is the IP of Kali Linux. 2. Write the exploit.py and chmod the 777 r 阅读全文
posted @ 2019-07-01 23:08 晨风_Eric 阅读(259) 评论(0) 推荐(0)
摘要:Finding the Right Module(mona) Mona Module Project website: https://github.com/corelan/mona 1. Download mona.py, and drop it into the 'OyCommands' fil 阅读全文
posted @ 2019-07-01 22:25 晨风_Eric 阅读(242) 评论(0) 推荐(0)
摘要:Finding Bad Characters 1. Find the bad charaters in the following website: https://bulbsecurity.com/finding-bad-characters-with-immunity-debugger-and- 阅读全文
posted @ 2019-06-30 19:27 晨风_Eric 阅读(305) 评论(0) 推荐(0)

上一页 1 ··· 7 8 9 10 11 12 13 下一页