Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet

Reverse Shell Cheat Sheet PAYLOAD ALL THE THINGS Summary Tools Reverse Shell Awk Automatic Reverse Shell Generator Bash TCP Bash UDP C Dart Golang Groovy Alternative 1 Groovy Java Alternative 1 Java Alternative 2 Java Lua Ncat Netcat OpenBsd Netcat BusyBox Netcat Traditional NodeJS OGNL OpenSSL Perl PHP Powershell Python Ruby Rust Socat Telnet War Meterpreter Shell Windows Staged reverse …

Read More
How to Setup Wireshark

How to Setup Wireshark

How to Setup Wireshark To set up your laptop to capture and analyze wireless network traffic using Aircrack-ng’s airmon-ng and Wireshark, follow these steps: First Buy and Get the necessary equipment To capture and analyze wireless network traffic using tools like Aircrack-ng’s airmon-ng and Wireshark, it’s essential to have a compatible wireless network adapter that supports monitor mode and packet …

Read More
Wireshark Cheat Sheet

Wireshark Cheat Sheet

Wireshark Cheat Sheet Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected to computer. Analyze over 750 protocols Can capture packets and save them to a file. Wireshark walkthrough the basics  Wireshark user guide …

Read More
Linux Cheat Sheet

Linux Cheat Sheet

Linux Cheat Sheet Linux commands cheat sheet How to update/upgrade Linux: What does APT do? APT (Advanced Packaging Tool) is a set of core tools found inside the Debian operating system. It provides utilities for the installation and removal of software packages and dependencies on a system. apt is a subset of apt-get and apt-cache commands providing necessary commands for …

Read More
Insert anchor

How to add Anchor Links in WordPress

How to add Anchor Links in WordPress How to add Anchor Links in WordPress, Learn how to create very easy anchor ids and links in WordPress. If you dont like using Gutenberg in WordPress like me, then you will find many of the tutorials on how to install anchor text not very good. So I put together this easy to …

Read More
Covering a broad Spectrum of Pentesting

Covering a broad Spectrum of Pentesting

Table of Contents Initial Scanning Port/Service Enumeration Port 21 — FTP Port 22 — SSH Port 25/110/143 — SMTP/POP3/IMAP Port 53 — DNS Port 80/443 — HTTP/S Port 139/445 — SMB/SAMBA Port 389/636 — LDAP/S Port 3306 — MySQL Port 3389 — RDP Shells File Transfers Privilege Escalation Initial Scanning The initial scanning phase is probably the most crucial aspect …

Read More
How to install Zenmap

How to install Zenmap

How to install Zenmap Zenmap is the official graphical user interface (GUI) for Nmap, a widely used network scanning and security auditing tool. It simplifies Nmap’s functionalities, making them more accessible, especially for users who prefer a visual interface over command-line operations. Why Use Zenmap? User-Friendly Interface: Zenmap provides an intuitive GUI, allowing users to perform complex network scans without …

Read More
How to use theHarvester

How to use theHarvester

How to use theHarvester What is theHarvester? theHarvester is an open-source intelligence (OSINT) tool designed to collect information such as email addresses, subdomains, IP addresses, and URLs from various public sources. It’s commonly used in the reconnaissance phase of penetration testing to map an organization’s external footprint. Why use theHarvester? Utilizing theHarvester enables security professionals to efficiently gather critical data …

Read More
How to Setup and Use Recon-ng

How to Setup and Use Recon-ng

How to Setup and Use Recon-ng Setting up Recon-ng  to install recon-ng you must have Python 3.6 or higher installed on your system, Please follow the instructions below to assist you in how to setup and use Recon-ng on your operating system. What is Recon-ng What is Recon-ng? Recon-ng is a web reconnaissance tool that automates information gathering to aid …

Read More
How to use BeEF

How to use BeEF

How to use BeEF BeEF (Browser Exploitation Framework) is a powerful penetration testing tool that focuses on exploiting web browsers. It is particularly useful for assessing the security of browser-based environments and understanding the risks posed by browser vulnerabilities. Here is a quick overview to help students understand how to use BeEF: What is BeEF? Purpose: BeEF is designed to …

Read More