Difference between revisions of "Hacking"

From rbachwiki
Jump to navigation Jump to search
(Created page with "== Port Tunneling and Socks5 Proxies with a Secure Shell (SSH) == <pre> ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made...")
 
Line 7: Line 7:


Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080
Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080
</pre>
== Websites==
nmap.org - website for nmap software
exploit-db.com
http://www.dvwa.co.uk/
==Software==
===Squid - webproxy chache===
https://portswigger.net/burp Burpsuite web application testing
===Nmap===
nmap -vv -A website.com
ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file
nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt
===Nslokup===
nslookup google.com
===using Grep with awk===
Host: 10.0.0.14 ()    Status: Up
grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}'  prints out the sencond field
cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt
Output
10.0.0.14
===using nmap with above output to scan multiple host===
nmap -iL scan.txt -vv
=== Script to give you info on a domain===
curl ipinfo.io/ipaddress
==  ==
<pre>
</pre>
==  ==
<pre>
</pre>
==  ==
<pre>
</pre>
==  ==
<pre>
</pre>
==  ==
<pre>
</pre>
==  ==
<pre>
</pre>
==  ==
<pre>


</pre>
</pre>

Revision as of 22:15, 8 August 2016

Port Tunneling and Socks5 Proxies with a Secure Shell (SSH)

ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made to the specified port goes through the tunnel as a SOCKS4 or SOCKS5 proxy. Perfect for secure web browsing

Usage: ssh user@111.111.111.111 -D 8080

Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080

Websites

nmap.org - website for nmap software exploit-db.com http://www.dvwa.co.uk/

Software

Squid - webproxy chache

https://portswigger.net/burp Burpsuite web application testing

Nmap

nmap -vv -A website.com

ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file

nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt

Nslokup

nslookup google.com

using Grep with awk

Host: 10.0.0.14 () Status: Up grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}' prints out the sencond field cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt

Output 10.0.0.14

using nmap with above output to scan multiple host

nmap -iL scan.txt -vv

Script to give you info on a domain

curl ipinfo.io/ipaddress