Skip to content

Commit cfe3248

Browse files
Update LinuxCheatSheet
Added Medusa section Added instructions on how to get BurpSuite Pro for free
1 parent cce8de5 commit cfe3248

File tree

1 file changed

+136
-7
lines changed

1 file changed

+136
-7
lines changed

LinuxCheatSheet

Lines changed: 136 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,18 @@ Host Only:
3030
Custom:
3131
This allows you to create your own virtual network
3232
===========================================================================================================================
33+
Free BurpSuite Pro installation:
34+
https://ftuapps.dev/burp-suite-professional-edition-v2-0-11-full-all-addons-keygen/
35+
1. Download and Extract
36+
2. Run 'BurpSuite Loader & Keygen'
37+
3. Press 'run' in upper right hand corner and Burpsuite will load
38+
===========================================================================================================================
3339
How to install dpkg:
3440
dpkg -i ~/Downloads/file.deb
3541
===========================================================================================================================
36-
Routersploit:
42+
<h1>Routersploit:</h1>
3743

38-
Install:
44+
<h3>Install:</h3>
3945
sudo apt-get install python-dev python-pip libncurses5-dev git
4046
git clone https://github.com/reverse-shell/routersploit
4147
cd routersploit
@@ -65,13 +71,21 @@ rsf > use creds/ssh_default
6571
rsf (SSH Default Creds) >
6672

6773
===========================================================================================================================
68-
CrackMapExec:
74+
CrackMapExec
75+
76+
CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living off the Land": abusing built-in Active Directory features/protocols to achieve it's functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.
77+
78+
CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques.
79+
80+
Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfigurations and simulate attack scenarios.
81+
6982
"crackmapexec smb <IP>"
7083
"crackmapexec smb <IP> --pass-pol
7184
enumerates password policy
7285
"crackmapexec smb <IP> --shares -u <random name> -p <random name>
7386
===========================================================================================================================
7487
SmbClient:
88+
smbclient is a client that can 'talk' to an SMB/CIFS server. It offers an interface similar to that of the ftp program. Operations include things like getting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server and so on.
7589
smbclient -L //<IP>
7690
enumerate shares(users) on a server
7791
smbclient //<IP>/<shares>
@@ -85,7 +99,9 @@ Mount to host OS instead of using smbclient:
8599

86100
===========================================================================================================================
87101
SmbMap:
88-
smbmap -H <IP>
102+
SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. This tool was designed with pen testing in mind, and is intended to simplify searching for potentially sensitive data across large networks.
103+
104+
"smbmap -H <IP>"
89105
===========================================================================================================================
90106
Nmap:
91107
Best 12 Nmap command examples:
@@ -225,9 +241,7 @@ db_status
225241
Metasploit Pro:
226242
https://localhost:3790/
227243
===========================================================================================================================
228-
MSFVenom Cheatsheet:
229-
230-
Meterpreter Commands:
244+
Meterpreter Commands:
231245

232246
Core Commands
233247
=============
@@ -552,6 +566,121 @@ Hydra:
552566

553567
hydra -l root -P /usr/share/wordlists/metasploit/piata_ssh_userpass.txt 69.167.51.201 -t 4
554568

569+
===========================================================================================================================
570+
Medusa:
571+
"medusa -h 192.168.1.1 -u "admin" -P hugewordlist.txt -M http"
572+
573+
-h [TARGET]
574+
Target hostname or IP address.
575+
576+
-H [FILE]
577+
Reads target specifications from the file specified rather than from the command line. The file should contain a list separated by newlines.
578+
579+
-u [TARGET]
580+
Target username.
581+
582+
-U [FILE]
583+
Reads target usernames from the file specified rather than from the command line. The file should contain a list separated by newlines.
584+
585+
-p [TARGET]
586+
Target password.
587+
588+
-P [FILE]
589+
Reads target passwords from the file specified rather than from the command line. The file should contain a list separated by newlines.
590+
591+
-C [FILE]
592+
File containing combo entries. Combo files are colon separated and in the following format: host:user:password. If any of the three fields are left empty, the respective information should be provided either as a single global value or as a list in a file.
593+
594+
-O [FILE]
595+
File to append log information to. Medusa will log all accounts credentials found to be valid or cause an unknown error. It will also log the start and stop times of an audit, along with the calling parameters.
596+
597+
-e [n/s/ns]
598+
Additional password checks ([n] No Password, [s] Password = Username). If both options are being used, they should be specified together ("-e ns"). If only a single option is being called use either "-e n" or "-e s".
599+
600+
-M [TEXT]
601+
Name of the module to execute (without the .mod extension).
602+
603+
-m [TEXT]
604+
Parameter to pass to the module. This can be passed multiple times with a different parameter each time and they will all be sent to the module (i.e. -m Param1 -m Param2, etc.)
605+
606+
-d
607+
Dump all known modules.
608+
609+
-n [NUM]
610+
Use for non-default TCP port number.
611+
612+
-s
613+
Enable SSL.
614+
615+
-g [NUM]
616+
Give up after trying to connect for NUM seconds (default 3).
617+
618+
-r [NUM]
619+
Sleep NUM seconds between retry attempts (default 3).
620+
621+
-R [NUM]
622+
Attempt NUM retries before giving up. The total number of attempts will be NUM + 1.
623+
624+
625+
-t [NUM]
626+
Total number of logins to be tested concurrently. It should be noted that rougly t x T threads could be running at any one time. 381 appears to be the limit on my fairly boring Gentoo Linux host.
627+
628+
-T [NUM]
629+
Total number of hosts to be tested concurrently.
630+
631+
-L
632+
Parallelize logins using one username per thread. The default is to process the entire username before proceeding.
633+
634+
-f
635+
Stop scanning host after first valid username/password found.
636+
637+
-F
638+
Stop audit after first valid username/password found on any host.
639+
640+
-b
641+
Suppress startup banner
642+
643+
-q
644+
Display module's usage information. This should be used in conjunction with the "-M" option. For example, "medusa -M smbnt -q".
645+
646+
-v [NUM]
647+
Verbose level [0 - 6 (more)]. All messages at or below the specified level will be displayed. The default level is 5.
648+
649+
-w [NUM]
650+
Error debug level [0 - 10 (more)]. All messages at or below the specified level will be displayed. The default level is 5.
651+
652+
-V
653+
Display version
654+
655+
Available Medusa Modules:
656+
657+
afp.mod : Brute force module for AFP sessions
658+
cvs.mod : Brute force module for CVS sessions
659+
ftp.mod : Brute force module for FTP/FTPS sessions
660+
http.mod : Brute force module for HTTP
661+
imap.mod : Brute force module for IMAP sessions
662+
mssql.mod : Brute force module for MSSQL sessions
663+
mysql.mod : Brute force module for MySQL sessions
664+
nntp.mod : Brute force module for NNTP sessions
665+
pcanywhere.mod : Brute force module for PcAnywhere sessions
666+
pop3.mod : Brute force module for POP3 sessions
667+
postgres.mod : Brute force module for PostgreSQL sessions
668+
rdp.mod : Brute force module for RDP (Microsoft Terminal Server) sessions
669+
rexec.mod : Brute force module for REXEC sessions
670+
rlogin.mod : Brute force module for RLOGIN sessions
671+
rsh.mod : Brute force module for RSH sessions
672+
smbnt.mod : Brute force module for SMB (LM/NTLM/LMv2/NTLMv2) sessions
673+
smtp-vrfy.mod : Brute force module for verifying SMTP accounts (VRFY/EXPN/RCPT TO)
674+
smtp.mod : Brute force module for SMTP Authentication with TLS
675+
snmp.mod : Brute force module for SNMP Community Strings
676+
ssh.mod : Brute force module for SSH v2 sessions
677+
svn.mod : Brute force module for Subversion sessions
678+
telnet.mod : Brute force module for telnet sessions
679+
vmauthd.mod : Brute force module for the VMware Authentication Daemon
680+
vnc.mod : Brute force module for VNC sessions
681+
web-form.mod : Brute force module for web form
682+
wrapper.mod : Generic Wrapper Module
683+
555684
===========================================================================================================================
556685
SQLmap:
557686
sqlmap -r search.req --batch --force-ssl

0 commit comments

Comments
 (0)