Category Archives: Network
Brute-force SMB shares

“Finding open shares is useful to a penetration tester because there may be private files shared, or, if it’s writable,…

Common nmap commands during Pentest

1. Discover live hosts in a subnet nmap -n -sn -PE -oA live_hosts 192.168.1.0/24nmap -n -sn -PE -oA live_hosts 192.168.1.0/24…

Import Nmap results into Nessus

Download the Nmap XML Import plugin from http://tenablesecurity.com/documentation/nmapxml.nasl Copy the nmapxml.nasl file into the Nessus plugins directory C:\ProgramData\Tenable\Nessus\nessus\plugins Run a…

Enumerate subdomains through a wordlist

Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. Usage knockpy [-h] [-v]…

OpenSSH server installation

To install the OpenSSH server application on your Ubuntu server system: Installation sudo apt-get install openssh-serversudo apt-get install openssh-server Backup…

SubBrute – fast subdomain enumeration tool

SubBrute is a DNS meta-query spider tool that enumerates DNS records, and subdomains. SubBrute is a community driven project with…

Aircrack-ng capture handshake and save it to file

Enable monitor mode airmon-ng start wlan0airmon-ng start wlan0 List nearest WiFi networks and channels airodump-ng mon0airodump-ng mon0 Capture packets from…

Enumerate DNS hostnames using nmap

nmap dns-brute script – Attempts to enumerate DNS hostnames by brute force guessing of common subdomains. With the dns-brute.srv argument,…

Trace a chain of DNS servers back to the source

dnstracer – determines where a given Domain Name Server (DNS) gets its information from for a given hostname, and follows…

Passive DNS network mapping

Dnsmap – Passive DNS network mapper a.k.a. subdomains bruteforcer. dnsmap is mainly meant to be used by pentesters during the…

Next Page