Wiki
  • Glossary
  • License
  • Myles' Wiki
  • Meta
  • Status
  • Android
    • Fire OS
  • Computer Science
    • Artificial Intelligence
    • Machine Learning
  • Cooking
    • Recipies
      • Desserts
        • Peanut Butter Swirl Brownies
  • Dat Protocol
  • Databases
    • MySQL
    • Postgres
  • DevOps
    • Ansible
    • Docker
  • Graphic Design
    • Adobe Illustrator
    • Design Systems
    • Pen Plotters
    • SVG
    • Zine
  • iOS
  • Linux
  • Lists
    • Books to Read :open_book:
    • Film to Watch :film_projector:
    • TV Shows to Binge :television:
    • Video Games to Play :joystick:
  • Pentesting
    • Metasploit
    • nmap Cheat Sheet
  • Productivity
  • Programming
    • CSS
    • GitHub
    • Go
    • GraphQL
    • Methodology
    • R
    • Ruby
    • Data Science
      • Organizing Data Science Projects
    • JavaScript
      • Node.js
      • Vue.js
        • Nuxt.js
    • PHP
      • Laravel
      • WordPress
    • Python
      • Anaconda
      • Celery
      • django
      • Jupyter
      • pandas
      • Useful Regular Expression
      • Wagtail
      • Web Scraping in Python
    • Static Website Generators
      • Hugo
      • Jekyll
      • VuePress
  • Raspberry Pi
  • Selfhosted
  • Setup
    • Android
    • Bag
    • iOS Applications
    • macOS Setup
    • Microsoft Windows Setup
  • Startup
  • Text Editors
    • Visual Studio Code
  • UNIX
  • User Experience (UX)
  • Windows
Powered by GitBook
On this page
  • Links
  • Useful Commands
  • Searching a range of IP Address
  • Useful Tools
  • DIRB
  • gobuster
  • Hydra
  • sqlmap

Pentesting

PreviousVideo Games to Play :joystick:NextMetasploit

Last updated 2 years ago

Pentesting is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

Links

Useful Commands

Searching a range of IP Address

root@kali:~# netdiscover -i eth2 -r 192.168.0.0/24

 Currently scanning: Finished!   |   Screen View: Unique Hosts

 4 Captured ARP Req/Rep packets, from 3 hosts.   Total size: 240
 _____________________________________________________________________________
   IP            At MAC Address     Count     Len  MAC Vendor / Hostname
 -----------------------------------------------------------------------------
 192.168.0.1     f8:1a:67:5a:fe:24      1      60  TP-LINK TECHNOLOGIES CO.,LTD
 192.168.0.100   a8:60:b6:3a:56:ce      2     120  Apple, Inc.
 192.168.0.101   e0:3f:49:14:a9:0d      1      60  Unknown vendor

Useful Tools

DIRB

Searches all the directory contents on a website

Usage

dirb http://192.168.0.104/ /usr/share/wordlists/dirb/big.txt

Resources

gobuster

Directory/file & DNS busting tool written in Go.

Resources

Hydra

Exploiting Username and Password forms.

Usage

hydra 192.168.0.104 http-post-form '/imfadministrator/index.php:user=^USER^&pass=^PASS^:Invalid password' -L /root/usernames.txt -P /usr/share/wordlists/metasploit/password.lst -vV -t 10 -w 30 -o hydra-http-post-attack.txt

Resources

sqlmap

Used for doing SQL injection stuff.

Usage

When having to log into an PHPSESSIONID auth:

sqlmap -u http://192.168.0.104/imfadministrator/cms.php?pagename=upload --banner --cookie="PHPSESSID=m0i2uapvsqlklug2tpe2a8cis2; security=low" -f

A Penetration Tester’s Guide to Postgres
Code injection – a simple PHP virus carried in a JPEG image
Injecting Malicious PHP In To An Image File : Injection And Execution
http://tools.kali.org/web-applications/dirb
https://github.com/seifreed/dirb
https://github.com/OJ/gobuster
http://insidetrust.blogspot.ca/2011/08/using-hydra-to-dictionary-attack-web.html
http://tools.kali.org/password-attacks/hydra/
https://www.blackmoreops.com/2015/12/23/crack-passwords-in-kali-linux-with-hydra/