Malwaredotpy - Linux Basics Pentesting Tutorials
Malwaredotpy - Linux Basics Pentesting Tutorials
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
Now, if you want to scan a hostname, simply replace the IP for the host:
"nmap cloudflare.com"
These kinds of basic scans are perfect for your first steps when starting with Nmap.
2. Scan specific ports or scan entire port ranges on a local or remote server
nmap -p 1-65535 localhost
Nmap is able to scan all possible ports, but you can also scan specific ports, which will report faster results. See below:
nmap -p 80,443 8.8.8.8
3. Scan multiple IP addresses
nmap 1.1.1.1 8.8.8.8
You can also scan consecutive IP addresses:
nmap -p 1.1.1.1,2,3,4
This will scan 1.1.1.1, 1.1.1.2, 1.1.1.3 and 1.1.1.4.
4. Scan IP ranges
nmap -p 8.8.8.0/28
This will scan 14 consecutive IP ranges, from 8.8.8.1 to 8.8.8.14.
An alternative is to simply use this kind of range:
nmap 8.8.8.1-14
You can even use wildcards to scan the entire C class IP range, for example:
nmap 8.8.8.*
This will scan 256 IP addresses from 8.8.8.1 to 8.8.8.256.
If you ever need to exclude certain IPs from the IP range scan, you can use the “–exclude” option, as you see below:
nmap -p 8.8.8.* --exclude 8.8.8.1
5. Scan the most popular ports
Using “–top-ports” parameter along with a specific number lets you scan the top X most common ports for that host.
"nmap --top-ports 20 192.168.1.106"
Replace “20” with the desired number.
6. Scan hosts and IP addresses reading from a text file:
Let’s suppose you create a list.txt file that contains these lines inside:
192.168.1.106
cloudflare.com
microsoft.com
securitytrails.com
The “-iL” parameter lets you read from that file, and scan all those hosts for you:
"nmap -iL list.txt"
7. Save your Nmap scan results to a file
"nmap -oN output.txt securitytrails.com"
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
msfdb init
db_status
Metasploit Pro:
https://localhost:3790/
============================================================================================================‐
===============
Meterpreter Commands:
Core Commands
=============
Command Description
------- -----------
? Help menu
background Backgrounds the current session
bg Alias for background
bgkill Kills a background meterpreter script
bglist Lists running background scripts
bgrun Executes a meterpreter script as a background thread
channel Displays information or control active channels
close Closes a channel
disable_unicode_encoding Disables encoding of unicode strings
enable_unicode_encoding Enables encoding of unicode strings
exit Terminate the meterpreter session
get_timeouts Get the current session timeout values
guid Get the session GUID
help Help menu
info Displays information about a Post module
irb Open an interactive Ruby shell on the current session
load Load one or more meterpreter extensions
machine_id Get the MSF ID of the machine attached to the session
migrate Migrate the server to another process
pivot Manage pivot listeners
pry Open the Pry debugger on the current session
quit Terminate the meterpreter session
read Reads data from a channel
resource Run the commands stored in a file
run Executes a meterpreter script or Post module
secure (Re)Negotiate TLV packet encryption on the session
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/
Linux Basics/Pentesting Tutorials Cheat Sheet
by Malware.py (malwaredotpy) via cheatography.com/153707/cs/33030/
cheatography.com/malwaredotpy/