🟥
LSWSec - Offensive
  • Introduction
  • File transfer
    • Transferring Files
      • Transferring Files - Linux
      • Transferring Files - Windows
  • Recon
    • Passive information Gathering
      • Website
      • Finding SubDomains
        • DNS
        • DNS Zone Transfer
    • Subdomain Enumeration
    • OSINT
      • Email
      • People
      • Social Media
      • Username and Accounts
      • Passwords
      • Business
      • Image and Location
    • Active Information Gathering
      • Nmap
      • Netcat
      • ss
      • Unknown Port Scanning
      • Footprinting
        • FTP
        • SMB
        • NFS
        • DNS
    • Vulnerability Searching
  • Ports
    • 21 - FTP
    • 22 - SSH
    • 23 - Telnet
    • 25 - SMTP
    • 69 - TFTP
    • 80 - HTTP
    • 88 - Kerberos
    • 110 - Pop3
    • 111 - RPCBind
    • 119 - NNTP
    • 135 - MSRPC
    • 139/445 - SMB
      • PSExec
      • Nmap
      • Other tools
    • 143/993 - IMAP
    • 161/162 - SNMP
    • 389/636 - LDAP
    • 443 - HTTPS
    • 554 - RTSP
    • 587 - Submission
    • 631 - Cups
    • 1433 - MsSQL
    • 2049 - NFS
    • 3306 - MySQL
    • 3389 - RDP
  • Web
    • useful information
    • Web Proxy
      • Burp
    • Web Content Discovery
    • SQL
    • Web Fuzzing with FFUF
      • Directory Fuzzing
      • Domain Fuzzing
      • Paramater fuzzing
    • Local File Inclusion
      • LFI
      • Basic Bypass
    • Authentication Bypass
    • IDOR
  • Priv-esc
    • Windows
      • mimikatz
  • Pivoting
    • Info
    • Locating other machines
    • proxy
    • SSH tunneling/port forwarding
    • plink
    • socat
    • chisel
    • sshuttle
    • connecting to windows environments with a user account
  • Command and Control
    • powershell empire
    • Armitage
  • Active Directory
    • Debugging DNS
    • NTLM Authenticated Services
    • LDAP Bind Credentials
Powered by GitBook
On this page
  1. Web

useful information

Brute force admin directories

medusa -h <ip> -u admin -P wordlist.txt -M http -m DIR:/test -T 10

General

ctrl+U View page source (in Firefox)

Gobsuter

gobuster dir -u http://10.10.10.121/ -w /usr/share/dirb/wordlists/common.txt Run a directory scan on a website.

gobuster dns -d inlanefreight.com -w /usr/share/SecLists/Discovery/DNS/namelist.txt Run a sub-domain scan on a website

Dirbuster

Dirbuster &
Add php.txt.html

curl

curl -IL https://www.inlanefreight.com Grab website banner curl 10.10.10.121/robots.txt List potential directories in robots.txt.

Web certs

whatweb 10.10.10.121 List details about the webserver/certificates

Nikto

Nikto -h https://<IP>

(if doesn’t work try with http)

Davtest

Davtest -url <url>

Joomla

joomscan

joomscan -u <URL>

BurpSuite

Credential stuffing

  • Use burp suite.

  • Go to webpage.

  • Go to sign in page.

  • Intercept a login request.

  • Right click Send to intruder.

  • Clear positions

  • Highlight email parameter and press add, do the same as password.

  • Use pitchfork.

  • Go to payloads.

  • Paste emails into 1st payload.

  • Paste passwords into 2nd payload.

  • Run attack.

  • Look for status or change in length.

Buffer Overflow

Useful commands

/etc/hosts

You can append the IP address of the box to a domain name by going to /etc/hosts and adding domain-name target-ip

At the end of a URL, you can add

{{1+1}}

if this comes back with ‘page 2 cannot be found’, it means that python can be used to execute commands between these brackets .

Feroxbuster

used to brute force recursive directories

Dalfox XXS scanning

cat file_URL.txt | hakrawler | gf | dalfox pipe | tee results.txt

Previous3389 - RDPNextWeb Proxy

Last updated 9 months ago

https://github.com/johnjhacking/Buffer-Overflow-Guide
GitHub - epi052/feroxbuster: A fast, simple, recursive content discovery tool written in Rust.GitHub
Logo