Nmap commands

TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24,; 10.0.0-255.1-254 -iL <inputfilename>: Input from list of hosts/networks -iR <num hosts>: Choose random targets –exclude <host1[,host2][,host3],…>: Exclude hosts/networks –excludefile <exclude_file>: Exclude list from file   HOST DISCOVERY:

Read more

Pentesting Windows/Active Directory environments

CrackMapExec A swiss army knife for pentesting Windows/Active Directory environments CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments! From enumerating logged on users and spidering SMB shares to executing psexec style attacks, auto-injecting Mimikatz/Shellcode/DLL’s into memory using Powershell, dumping

Read more

Vulnerability information

The following is a list of online repositories: Repository name Website URL Offensive Security’s Exploit Database https://www.exploit-db.com/ Common Vulnerabilities & Exposures (CVE) https://cve.mitre.org/ BugtraqSecurityFocus http://www.securityfocus.com OSVDB Vulnerabilities http://osvdb.org Packet Storm http://www.packetstormsecurity.org National Vulnerability Database http://nvd.nist.gov IBM ISS X-Force https://exchange.xforce.ibmcloud.com/ US-CERT

Read more

Pin It on Pinterest