Tool Syntax
How to use the tools
Nmap command
Scanning methods
Switch Explanation
Capabilities
Switch Explanation
Advanced features
Switch Explanation
Firewall evasion
Switch Explanation
Convert xml output to html
Create active hosts
Compare nmap results
reverse dns lookup in ip range
ids test (xmas scan with ips bait and spoofing)
List of nmap scripts
name
Explanation
Wireshark software
Filter Explanation
Command operators
Logical operators
Netcat command
Fundamental
Start HTTP SOCKS server at Automation-Server
Scan ports
transfer files
Backdoor shells
Use VLC for streaming
Saving and streaming the screen through the udp protocol to the attacker’s address and port 1234
Save and stream the screen in http protocol
Save and stream on broadcast
Save and record the screen in a file
Record and stream microphone on udp
SSH command
Connect with ssh with specific port
Reverse port forwarding using the tunnel (in the support user reverse shell)
Set x11 victim to attacker
Create port forward on port 8080 and transfer to port 443 of the attacker
Using port forward on the attacker’s port 8080 and transferring information using ssh tunnel and port 3300 3.3.3.3
Dynamic tunnel using proxychain. Also, the file /etc/proxychain.conf to set the port (1080)
Create multi-hop ssh tunnel
Metasploit software
Command
Description
Sqlmap command
Send request Get
Send Post request
SQL injection in a specific parameter and knowing the type of database
SQL injection on the page requiring authentication
SQL injection and getting the database version and its name and user
SQL injection and get database tables db=testdb
SQL injection and receiving table columns
Read from file
Get the records of the specified table from the specified database
Using the delay technique
Bypass waf with unicode
msf
Creating meterpreter payload (for Linux: -t file -o callback)
Create payload with bound meterpreter
Creating a Java reverse shell
Creating a reverse shell for Windows with msfvenom
Generate encoded payload using msfvenom
Start database msf (bt5=mysql,kali=postgresql)
return the shell (by default it will run notepad and injection)
Display the html banner in the internal network
Meterpreter
Increasing access level
Impersonation token (removing the token will stop impersonation)
Using nmap in meterpreter socks proxy
Railgun - api related to displaying specific messages
Creating a stable Windows service
Collect the latest requested files and web links
Create a new process and command tree c:\
Ettercap software
Main-In-Middle attack using filters
Main-In-Middle attack on subnet with functional fitters
Switch flood attack
Ettercap filters
Compile ettercap filters
Example filter - remove vpn traffic and decrypt http traffic
Mimikatz command
Hping command3
Arping command
Wine command
Grub software
Hydra command
hashcat software
NTLMv2 crack
John the ripper software
Crack with word list
Sample formats
List of passwords
Creating different words based on one word
Vsown command
File hash
Hash length
Software with different hash databases
Malware hash database
Search in metadata files
Search the virustotal database
Guess the password of the zip file
Guess the password of the winrm service
Guess the password of the smb service
Connect to mssql with impackt
powershell download files
List of Pods
Check if you have rights to exec into any pods
exec into sensitive-pod
More information about the environment
RouterSploit
Discover Devices
Scan for vulnerabilities
Brute Force
Exploit vulnerabilities
Generate Payloads
Sniffing
Dos Attacks
Password Attacks
Shodan Integration
Last updated