Helpful Websites

Views: 5Wordlists General Linux Kernel CVEs | All CVEs https://github.com/lucyoa/kernel-exploits Basic Linux Privilege Escalation – https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ Linux Privilege Escalation – https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md Checklist – Linux Privilege Escalation – https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist Sushant 747’s Guide (Country dependant – may need VPN) – https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_-_linux.html Linux Privilege Escalation LinPeas – https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinEnum – https://github.com/rebootuser/LinEnum Linux Exploit Suggester – https://github.com/mzet-/linux-exploit-suggester Linux Priv Checker – https://github.com/sleventyeleven/linuxprivchecker PayLoadAlltheThings https://github.com/swisskyrepo/PayloadsAllTheThings

Hydra Cheat Sheet

Views: 250Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. It supports: Cisco AAA, … Read more

Disclaimer

Views: 96Use of this blog means agreement to the following terms: 1. Information provided on this blog are for educational purposes only. The site is no way responsible for any misuse of the information. 2. This blog is all about Cyber Security covering both Offensive and Defensive security principles and technologies. 3. This blog is totally meant for … Read more

ATTACKING COMMONLY USED SERVICES: PART_03 Exploiting FTP

This entry is part 3 of 3 in the series Offensive Testing Enterprise Networks

Views: 100By default, FTP service uses TCP port 21. However, it’s possible to modify the default port and run the ftp service using another TCP port. Basic FTP Commands Command Description ?/help print local help information append Append to a file ascii set ascii transfer type binary Set Binary transfer type bye/exit/quit Terminate ftp session … Read more

ATTACKING COMMONLY USED SERVICES: PART_01 Useful Commands

Views: 23Server Message Block (SMB) Windows – CMD line net use Connect to a File share \\192.168.45.29\ITSupport\ The command net use connects a computer to or disconnects a computer from a shared resource or displays information about computer connections.  Windows CMD – DIR Displays a list of a directory’s files and subdirectories dir \\192.168.45.29\ITSupport\ Enumerate file shares … Read more

Threat Intelligence Tools – Abuse.ch

This entry is part 8 of 17 in the series Incident Response and Forensics

Views: 64Abuse.ch Platform Abuse.ch is a research project hosted by the Institue for Cybersecurity and Engineering at the Bern University of Applied Sciences in Switzerland. It was developed to identify and track malware and botnets through several operational platforms developed under the project. These platforms are: MalwareBazaar As the name suggests, this project is an all … Read more

Threat Intelligence Tools – URLScan.io

This entry is part 6 of 17 in the series Incident Response and Forensics

Views: 65Urlscan.io is a free service developed to assist in scanning and analysing websites. It is used to automate the process of browsing and crawling through websites to record activities and interactions. When a URL is submitted, the information recorded includes the domains and IP addresses contacted, resources requested from the domains, a snapshot of the … Read more

Threat Intelligence

This entry is part 15 of 17 in the series Incident Response and Forensics

Views: 11Threat Intelligence Foundation: Threat Intelligence is the analysis of data and information using tools and techniques to generate meaningful patterns on how to mitigate against potential risks associated with existing or emerging threats targeting organisations, industries, sectors or governments. To mitigate against risks, we can start by trying to answer a few simple questions: … Read more