Skip to content

Latest commit

 

History

History
59 lines (30 loc) · 1.48 KB

EXTRA CONTENT.md

File metadata and controls

59 lines (30 loc) · 1.48 KB

EXTRA CONTENT

extract .tar.gz file -> tar xzf archive.tar.gz

  • WEB APPS VULNERABILITY SCAN:

With wmap:

In meterpreter:

load wmap -> wmap_TAB (to see commands)

wmap_sites -h (to specify a webpage to scan)

wmap_sites -a IPobj (add that page/IP to wmap)

wmap_targets -h (if we have more targets)

wmap_targets -t http://IPobj/youcanspecifyadirectory (to input targets)

wmap_run -h (run auxiliar modules to detect vulns)

wmap_run -t (displays the auxiliar modules that we can use and try some basics like http-version, etc)

With NIKTO:

TUTORIAL NIKTO WEB APP VULN SCAN

With WPscan (wordpress scan):

WP SCAN USER DOCUMENTATION

  • CROSS COMPILING EXPLOITS:

pre compiled to download and use directly

or:

Select the exploits to compile or cross compile:

The C language exploits should have information for how to compile with con mingwif they are well configured, if you don't find the information use the default mode for compiling.

Windows:

x64:

i686-w64-mingw32-gcc exploit.c -o exploit (export to portable executable)

if a error is shown, after -gcc there are more -args, tab too see them.

x32:

i686-w64-mingw32-gcc exploit.c -o exploit -lws2_32

Linux:

use gcc directly.

  • REVERSE SHELLS CHEATSHEET: