随笔分类 - 艺术
摘要:Networking of Sniffing Crash Theory Practice - Part 1 OSI Model Secure vs. Insecure protocols Insecure protocols: HTTP, FTP, Telnet, SNMP v1/2 etc. Se
阅读全文
摘要:Wireshark for Ethical Hackers - 4 Alfa Adapter is required which support wireless G/N. Parameter Value Chipset Realtek RTL8814AU WiFi Standards IEEE 8
阅读全文
摘要:Wireshark for Ethical Hackers - 3 Blue Team - Defender View nmap Attacker IP: 192.168.1.17 Defender IP: 192.168.1.15 Case 1: Run following syn attack
阅读全文
摘要:Wireshark for Ethical Hackers - 2 Interface Overview Start Wireshark in Kali Linux. HTTP Image Extracting filter: image-jfif Show packet bytes / Expor
阅读全文
摘要:Wireshark for Ethical Hackers - 1 Outline Prereq Interface Overview HTTP Passwords Blue Team Wireless Prerequisites OSI Model 7 Layers of the OSI Mode
阅读全文
摘要:PowerShell - Deep Dive Function # Creating Simple Function Write-Host "I have Dell Laptops with Windows OS" Function Global:Get-MachineInfo { Write-Ho
阅读全文
摘要:PowerShell - Error Handling Understanding Error Variable in detail to use it efficiently $error.GetType() $error[0] Test $error[0].Exception.GetType()
阅读全文
摘要:PowerShell - Loops If Statement # If statement with Zero else Statement $Number = 16 if ($Number -gt 10) { Write-Host "The value $Number is gerater th
阅读全文
摘要:PowerShell - Hashtable #### Hashtable #array $numbers = 1..9 $numbers $numbers[4] #Hashtable #1st Approach $HT = @{} #2nd Approach $HT = @{ Tony = 30
阅读全文
摘要:PowerShell - Arrays How to declare or create and operate an Array # Creating Array using Array Operator $fruits = @("Apple","Orange","KiWi") $fruits $
阅读全文
摘要:PowerShell - Pipelines Pipeline A series of commands connected by pipeline operators (|) Output of Preceding command becomes input of next command Obj
阅读全文
摘要:PowerShell - Operators # arithmetic operators (+, -, *, /, %) [int] $1stnumber = Read-host "Enter 1st number " [int] $2ndnumber = Read-host "Enter 2nd
阅读全文
摘要:PowerShell - Variables # variables are limited to Scope in which they are created $Console_Ctreated = 1 Invoke-Command -ScriptBlock {$Script_Created =
阅读全文
摘要:OSCP Security Technology - Pivoting Configure vmware - Virtual Network Editor Set Kali, Windows 7 and Kioptrix virtual machines Kali Linux - VMnet7 (H
阅读全文
摘要:OSCP Security Technology - Post-Exploit Password Attacks Find the three passwords files saved previously. John locate rockyou john --wordlist=/usr/sha
阅读全文
摘要:OSCP Security Technology - Windows Post Exploitation Software stores in folder - C:/Users/IEUser/ netcat-1.11 (Download: https://eternallybored.org/mi
阅读全文
摘要:OSCP Security Technology - Linux Post Exploitation Start Metasploit. msfconsole Target VM: Kioptrix Refer to Linux post exploitation cheat sheet: http
阅读全文
摘要:OSCP Security Technology - Privilege Escalation Preparation Download and install target virtual machine - basic pentesting 1: https://www.vulnhub.com/
阅读全文
摘要:OSCP Security Technology - File Transfers(1) File Transfers HTTP wget FTP TFTP Powershell Metasploit Browse the following Link: http://192.168.1.14/ex
阅读全文
摘要:OSCP Security Technology - Remote File Inclusion(RFI) DVWA Download and install DVWA . https://dvwa.co.uk/ Pre-set Browser the following website.(admi
阅读全文

浙公网安备 33010602011771号