Basic
Target Scan
Nmap
nmap -sC -sV -oA <location> <ip>
nmap -v -p- -A <ip>Fuzz & Crack
Hashcat
hashcat -m <mode> <hash.txt> <wordlist.txt>Create your own wordlist:
hashcat --force <passwords.txt> -r <best64.rule> --stdoutffuf
Fuzz Faster U Fool. I guess that replaces Hydra and wfuzz.
Hosting
Host a file locally
Shells
nc
TCP/IP Swiss army knife#
Reverse Shells
Bob (Windows) dicrectly connected to Internet, Alice (Linux) behind NAT.
Bind Shell
Reverse Shell
More: Reverse Shell Cheatsheet
Getting a nicer prompt
PrivEsc
Enumeration Scripts
Seatbelt (for Windows)
Monitoring
pspy - proccess snooping
Last updated
Was this helpful?