How to write a basic bash script with an example of a ping sweep to return live hosts.
Understanding linux file permissions and how to change them using chmod.
Very basic Linux Terminal commands for the beginner pen tester.
So you’ve managed to get root on a linux virtual machine, congrats! However this isn’t where the fun stops. From here you can access the files containing the usernames and their hashed passwords. These files are known as the passwd and shadow files. They can be combined into one file using the unshadow tool so […]
One of the more common services open to exploitation is Netbios / SMB or Samba service. During a pen test where do you go from here?
So you have found an installation of wordpress on your vulnerable virtual machine. What next? WPScan In your browser copy the address of the wordpress installation. At the terminal in Kali type the following: wpscan –url http://172.16.195.202/wordpress/ –enumerate Replace the URL with the URL of the vulnerable wordpress installation. Once the scan has been completed […]
So you have run an Nmap scan and you have open port 21 that has been identified as being ftp. What next? Run the NMap scan using the -A flag. This will tell you if the ftp allows anonymous login. The very simplest command you can enter at the prompt is: ftp 172.16.195.202 Replace the […]