Basic

Target Scan

Nmap

nmap -sC -sV -oA <location> <ip>
nmap -v -p- -A <ip>

Fuzz & Crack

Hashcat

hashcat -m <mode> <hash.txt> <wordlist.txt>

Create your own wordlist:

hashcat --force <passwords.txt> -r <best64.rule> --stdout

Find rules in /usr/share/hashcat/rules/

ffuf

Fuzz Faster U Fool. I guess that replaces Hydra and wfuzz.

Hosting

Host a file locally

Shells

nc

TCP/IP Swiss army knife#

Reverse Shells

Bob (Windows) dicrectly connected to Internet, Alice (Linux) behind NAT.

Bind Shell

Reverse Shell

More: Reverse Shell Cheatsheet

Getting a nicer prompt

PrivEsc

Enumeration Scripts

Monitoring

  • pspy - proccess snooping

Last updated

Was this helpful?