随笔分类 -  艺术

上一页 1 2 3 4 5 6 7 8 ··· 16 下一页
摘要:Networking of Sniffing Crash Theory Practice - Part 1 OSI Model Secure vs. Insecure protocols Insecure protocols: HTTP, FTP, Telnet, SNMP v1/2 etc. Se 阅读全文
posted @ 2022-03-10 21:38 晨风_Eric 阅读(35) 评论(0) 推荐(0)
摘要:Wireshark for Ethical Hackers - 4 Alfa Adapter is required which support wireless G/N. Parameter Value Chipset Realtek RTL8814AU WiFi Standards IEEE 8 阅读全文
posted @ 2022-03-06 16:52 晨风_Eric 阅读(110) 评论(0) 推荐(0)
摘要:Wireshark for Ethical Hackers - 3 Blue Team - Defender View nmap Attacker IP: 192.168.1.17 Defender IP: 192.168.1.15 Case 1: Run following syn attack 阅读全文
posted @ 2022-03-03 10:01 晨风_Eric 阅读(39) 评论(0) 推荐(0)
摘要:Wireshark for Ethical Hackers - 2 Interface Overview Start Wireshark in Kali Linux. HTTP Image Extracting filter: image-jfif Show packet bytes / Expor 阅读全文
posted @ 2022-02-22 14:52 晨风_Eric 阅读(48) 评论(0) 推荐(0)
摘要:Wireshark for Ethical Hackers - 1 Outline Prereq Interface Overview HTTP Passwords Blue Team Wireless Prerequisites OSI Model 7 Layers of the OSI Mode 阅读全文
posted @ 2022-02-21 21:12 晨风_Eric 阅读(43) 评论(0) 推荐(0)
摘要:PowerShell - Deep Dive Function # Creating Simple Function Write-Host "I have Dell Laptops with Windows OS" Function Global:Get-MachineInfo { Write-Ho 阅读全文
posted @ 2022-02-13 17:45 晨风_Eric 阅读(68) 评论(0) 推荐(0)
摘要:PowerShell - Error Handling Understanding Error Variable in detail to use it efficiently $error.GetType() $error[0] Test $error[0].Exception.GetType() 阅读全文
posted @ 2022-02-10 22:04 晨风_Eric 阅读(48) 评论(0) 推荐(0)
摘要:PowerShell - Loops If Statement # If statement with Zero else Statement $Number = 16 if ($Number -gt 10) { Write-Host "The value $Number is gerater th 阅读全文
posted @ 2022-01-28 15:29 晨风_Eric 阅读(61) 评论(0) 推荐(0)
摘要:PowerShell - Hashtable #### Hashtable #array $numbers = 1..9 $numbers $numbers[4] #Hashtable #1st Approach $HT = @{} #2nd Approach $HT = @{ Tony = 30 阅读全文
posted @ 2022-01-10 11:32 晨风_Eric 阅读(51) 评论(0) 推荐(0)
摘要:PowerShell - Arrays How to declare or create and operate an Array # Creating Array using Array Operator $fruits = @("Apple","Orange","KiWi") $fruits $ 阅读全文
posted @ 2022-01-07 16:08 晨风_Eric 阅读(33) 评论(0) 推荐(0)
摘要:PowerShell - Pipelines Pipeline A series of commands connected by pipeline operators (|) Output of Preceding command becomes input of next command Obj 阅读全文
posted @ 2022-01-05 10:49 晨风_Eric 阅读(47) 评论(0) 推荐(0)
摘要:PowerShell - Operators # arithmetic operators (+, -, *, /, %) [int] $1stnumber = Read-host "Enter 1st number " [int] $2ndnumber = Read-host "Enter 2nd 阅读全文
posted @ 2022-01-05 09:57 晨风_Eric 阅读(40) 评论(0) 推荐(0)
摘要:PowerShell - Variables # variables are limited to Scope in which they are created $Console_Ctreated = 1 Invoke-Command -ScriptBlock {$Script_Created = 阅读全文
posted @ 2022-01-04 17:44 晨风_Eric 阅读(42) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Pivoting Configure vmware - Virtual Network Editor Set Kali, Windows 7 and Kioptrix virtual machines Kali Linux - VMnet7 (H 阅读全文
posted @ 2021-12-27 13:49 晨风_Eric 阅读(71) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Post-Exploit Password Attacks Find the three passwords files saved previously. John locate rockyou john --wordlist=/usr/sha 阅读全文
posted @ 2021-11-07 21:05 晨风_Eric 阅读(87) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Windows Post Exploitation Software stores in folder - C:/Users/IEUser/ netcat-1.11 (Download: https://eternallybored.org/mi 阅读全文
posted @ 2021-10-23 22:30 晨风_Eric 阅读(73) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Linux Post Exploitation Start Metasploit. msfconsole Target VM: Kioptrix Refer to Linux post exploitation cheat sheet: http 阅读全文
posted @ 2021-10-17 08:43 晨风_Eric 阅读(50) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Privilege Escalation Preparation Download and install target virtual machine - basic pentesting 1: https://www.vulnhub.com/ 阅读全文
posted @ 2021-09-26 00:30 晨风_Eric 阅读(1161) 评论(0) 推荐(0)
摘要:OSCP Security Technology - File Transfers(1) File Transfers HTTP wget FTP TFTP Powershell Metasploit Browse the following Link: http://192.168.1.14/ex 阅读全文
posted @ 2021-09-06 00:18 晨风_Eric 阅读(87) 评论(0) 推荐(0)
摘要:OSCP Security Technology - Remote File Inclusion(RFI) DVWA Download and install DVWA . https://dvwa.co.uk/ Pre-set Browser the following website.(admi 阅读全文
posted @ 2021-08-15 21:00 晨风_Eric 阅读(114) 评论(0) 推荐(0)

上一页 1 2 3 4 5 6 7 8 ··· 16 下一页