Usefull Commands
Usefull Commands
0/24
Connect to RDP via cmd - mstsc
Find DNS records - https://www.nslookup.io/
Scan the whole website- (skipfish -o /root/test -S
/usr/share/skipfish/dictionaries/complete.wl http://10.10.10.10:8080)
-o output
-S wordlist
To brute force directories or files-
robuster dir -u 10.10.10.10 -w /usr/share/dirb/wordlists/common.txt -x .txt
OR
uniscan -u http://10.10.10.12:8080/CEH -q (for directories)
uniscan –u http://10.10.10.12:8080/CEH -we (enable file check like robots.txt and
sitemap.xml)
To get the file from the server- get http://10.10.10.10/secret.txt
FTP Login - ftp <ip>
get <file name> (to get file from FTP login)
SSH Login - SSH [email protected]
Nmap scan
Nmap -A 10.10.10.10 (aggressive scan- Traceroute, T4, OS)
nmap -sC (service scan)
nmap -sV (version scan)
nmap -sP 10.10.10.10/24 (how many hosts are up in the whole network)/ping scan
nmap -sL (hostnames)
nmap -oN <filename> (to save output in a file)
nmap -F (fast scan)
nmap -O (os scan)
Android Hacking-
via USB
./adb tcpip 5555
./adb connect 192.168.43.117:5555
./adb devices
./adb -d shell (Direct an adb command to the only attached USB device)
ls
cd sdcard
ls
cd dcim
cd camera
ls
./adb push C:\platform-tools\ota.zip /sdcard/Download
(from pc to android)
< pc location > <android location>
sqlmap-
site:http://testphp.vulnweb.com/ php?= (for finding vulnerable site)
(for cookies- console->document.cookie)