Professional Documents
Culture Documents
Samhacktools
Samhacktools
HTTrack websitecopier
google- directives
the harvester (email harvester)
whois.net
netcraft
host
Ns lookup
email extractor
( One of the first things to do when
attempting to recon an e-mail server is to send an e-mail to the organization
with an empty .bat file or a nonmalicious .exe file like calc.exe.)
scanning
ping
port scanning
TCP
To run a TCP connect, we issue the following command from a terminal:
nmap –sT -p- -PN 172.16.45.135
SYN
To run a SYN scan, you can open a terminal window and issue the following
command:
nmap –sS -p- -PN 172.16.45.135
UDP
To run a UDP scan against our target, we would enter
the following command in a terminal:
nmap –sU 172.16.45.129
vulnerability scanning
www.nessus.org.
exploit
using metasploit
from your nessus result
type msf > search ms08-067
(
After searching, Metasploit found a matching exploit and provided us with
several pieces of information about the exploit.
● First it provided us with a name and location; “windows/smb/
ms08_067_netapi.”
● Next Metasploit provided us with a “Rank.”
It is important to pay close attention to the exploit rank. This information
provides details about how dependable the exploit is (how often the exploit is
successful) as well as how likely the exploit is to cause instability or crashes on
the
target system. Numerically, the higher an exploit is ranked, the more likely it
is to succeed and the less likely it is to cause disruptions on the target system.
Metasploit uses seven ratings to rank each exploit:
1. Manual
2. Low
3. Average
4. Normal
5. Good
)
msf exploit
///
Metasploit Payload Name Payload Description
windows/adduser Create a new user in the local administrator
group on the target machine
windows/exec Execute a Windows binary (.exe) on the target
machine
windows/shell_bind_tcp Open a command shell on the target machine
and wait for a connection
windows/shell_reverse_tcp Target machine connects back to the attacker
and opens a command shell (on the target)
windows/meterpreter/bind_tcp Target machine installs the Meterpreter and
waits for a connection
windows/meterpreter/reverse_tcp Installs Meterpreter on the target machine then
creates a connection back to the attacker
windows/vncinject/bind_tcp Installs VNC on the target machine and waits
for a connection
windows/vncinject/reverse_tcp Installs VNC on the target machine and sends
VNC connection back to target
//