上一页 1 ··· 5 6 7 8 9 10 11 12 13 ··· 57 下一页
摘要: PowerShell - Arrays How to declare or create and operate an Array # Creating Array using Array Operator $fruits = @("Apple","Orange","KiWi") $fruits $ 阅读全文
posted @ 2022-01-07 16:08 晨风_Eric 阅读(35) 评论(0) 推荐(0)
摘要: PowerShell - Pipelines Pipeline A series of commands connected by pipeline operators (|) Output of Preceding command becomes input of next command Obj 阅读全文
posted @ 2022-01-05 10:49 晨风_Eric 阅读(48) 评论(0) 推荐(0)
摘要: PowerShell - Operators # arithmetic operators (+, -, *, /, %) [int] $1stnumber = Read-host "Enter 1st number " [int] $2ndnumber = Read-host "Enter 2nd 阅读全文
posted @ 2022-01-05 09:57 晨风_Eric 阅读(41) 评论(0) 推荐(0)
摘要: PowerShell - Variables # variables are limited to Scope in which they are created $Console_Ctreated = 1 Invoke-Command -ScriptBlock {$Script_Created = 阅读全文
posted @ 2022-01-04 17:44 晨风_Eric 阅读(43) 评论(0) 推荐(0)
摘要: OSCP Security Technology - Pivoting Configure vmware - Virtual Network Editor Set Kali, Windows 7 and Kioptrix virtual machines Kali Linux - VMnet7 (H 阅读全文
posted @ 2021-12-27 13:49 晨风_Eric 阅读(72) 评论(0) 推荐(0)
摘要: OSCP Security Technology - Post-Exploit Password Attacks Find the three passwords files saved previously. John locate rockyou john --wordlist=/usr/sha 阅读全文
posted @ 2021-11-07 21:05 晨风_Eric 阅读(88) 评论(0) 推荐(0)
摘要: OSCP Security Technology - Windows Post Exploitation Software stores in folder - C:/Users/IEUser/ netcat-1.11 (Download: https://eternallybored.org/mi 阅读全文
posted @ 2021-10-23 22:30 晨风_Eric 阅读(73) 评论(0) 推荐(0)
摘要: OSCP Security Technology - Linux Post Exploitation Start Metasploit. msfconsole Target VM: Kioptrix Refer to Linux post exploitation cheat sheet: http 阅读全文
posted @ 2021-10-17 08:43 晨风_Eric 阅读(50) 评论(0) 推荐(0)
摘要: OSCP Security Technology - Privilege Escalation Preparation Download and install target virtual machine - basic pentesting 1: https://www.vulnhub.com/ 阅读全文
posted @ 2021-09-26 00:30 晨风_Eric 阅读(1179) 评论(0) 推荐(0)
摘要: OSCP Security Technology - File Transfers(1) File Transfers HTTP wget FTP TFTP Powershell Metasploit Browse the following Link: http://192.168.1.14/ex 阅读全文
posted @ 2021-09-06 00:18 晨风_Eric 阅读(88) 评论(0) 推荐(0)
上一页 1 ··· 5 6 7 8 9 10 11 12 13 ··· 57 下一页