<aside> πŸ“Œ Summary

</aside>

sudo mount /dev/sdb1 /mnt/common-campus

Enumeration

Searchsploit

<aside> πŸ” Searchsploit

searchsploit "thing"
searchsploit -m <module>

</aside>

find / -type f \\( -name "local.txt" -o -name "proof.txt" \\) 2>/dev/null
powershell -c "Get-ChildItem -Path C:\\ -Recurse -File -ErrorAction SilentlyContinue | Where-Object { $_.Name -eq 'proof.txt' -or $_.Name -eq 'local.txt' } | ForEach-Object { $_.FullName }"
cd C:\\ && dir /s /b "proof.txt" "local.txt" 2>nul

Shells

Reverse shell

<aside> ♾️ Reverse shell

Online - Reverse Shell Generator

rlwrap nc -lnvp <port>

</aside>

Full TTY

<aside> <img src="/icons/circle-seven-eighths_blue.svg" alt="/icons/circle-seven-eighths_blue.svg" width="40px" /> Full TTY

python3 -c 'import pty;pty.spawn("/bin/bash")'
stty raw -echo; fg

https://github.com/cornerpirate/socat-shell

</aside>

Windows

<aside> 🐚 Gaining shell access

psexec.py SEED.local/jdoe:[email protected]
xfreerdp /v:[IP] /u:[username] /p:[password] /dynamic-resolution /d:[domain] /drive:/[path of the drive]

</aside>

Pivoting

<aside> πŸ‘‰ Pivoting

Initial vector

Fundamental of pivoting

Enumeration

Proxy

SSH Tunnelling / Port Forwarding

Plink.exe

Socat

Chisel

sshuttle

</aside>

<aside> πŸ‘‰ Ligolo-ng

Network Pivoting with Ligolo-NG

https://github.com/nicocha30/ligolo-ng

</aside>


Scan

Nmap

Host Discovery

<aside> <img src="/icons/barcode_purple.svg" alt="/icons/barcode_purple.svg" width="40px" /> Host Discovery

arp-scan -l
arp -a

Powershell one liner :

1..254 | ForEach-Object {Get-WmiObject Win32_PingStatus -Filter "Address='192.168.0.$_' and Timeout=200 and ResolveAddressNames='true' and StatusCode=0" | select ProtocolAddress*}

ipsweep.sh :

 #!/bin/bash

for ip in `seq 1 254`; do
        ping -c 1 $1.$ip | grep "64 bytes" | cut -d " " -f 4 | tr -d ":"&
done

</aside>

Nmap

<aside> πŸ—ΊοΈ Nmap

nmap -T4 -p- -A <address> # default scan
nmap --script=smb2-security-mode.nse -p445 192.168.149.0/24
nmap --script=smb2-security-mode.nse -p445 192.168.149.0/24
nmap -T4 -p- -sV -sC 192.168.250.127 # Scan all port with default script and version 
# remove -sC to only version test
# | awk -F/ '/open/ {b=b","$1} END {print substr(b,2)}'
/bin/systemctl start nessusd.service # <https://kali:8834/>

</aside>

Password cracking

15 - Password Attack

https://github.com/ohmybahgosh/RockYou2021.txt

Hash identification

<aside> <img src="/icons/badge_brown.svg" alt="/icons/badge_brown.svg" width="40px" /> Hash identification

hashid <hash> / <hashfile>
hash-identifier # idk how it work I mainly use hashid :p

</aside>

Hydra

<aside> <img src="/icons/badge_brown.svg" alt="/icons/badge_brown.svg" width="40px" /> Hash identification

hydra -l userlogin -P password-list-adress ftp://<IP> -V

</aside>

Hashcat

<aside> 🐈 Hashcat

hashcat -m <mode> -r/usr/share/hashcat/rules/best64.rule <hash> /usr/share/wordlists/rockyou.txt

| --- | --- |

Import file from url

Privilege Escalation

Active Directory