Difference between revisions of "Hacking"
Jump to navigation
Jump to search
(Created page with "== Port Tunneling and Socks5 Proxies with a Secure Shell (SSH) == <pre> ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made...") |
|||
Line 7: | Line 7: | ||
Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080 | Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080 | ||
</pre> | |||
== Websites== | |||
nmap.org - website for nmap software | |||
exploit-db.com | |||
http://www.dvwa.co.uk/ | |||
==Software== | |||
===Squid - webproxy chache=== | |||
https://portswigger.net/burp Burpsuite web application testing | |||
===Nmap=== | |||
nmap -vv -A website.com | |||
ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file | |||
nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt | |||
===Nslokup=== | |||
nslookup google.com | |||
===using Grep with awk=== | |||
Host: 10.0.0.14 () Status: Up | |||
grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}' prints out the sencond field | |||
cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt | |||
Output | |||
10.0.0.14 | |||
===using nmap with above output to scan multiple host=== | |||
nmap -iL scan.txt -vv | |||
=== Script to give you info on a domain=== | |||
curl ipinfo.io/ipaddress | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | |||
== == | |||
<pre> | |||
</pre> | </pre> |
Revision as of 22:15, 8 August 2016
Port Tunneling and Socks5 Proxies with a Secure Shell (SSH)
ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made to the specified port goes through the tunnel as a SOCKS4 or SOCKS5 proxy. Perfect for secure web browsing Usage: ssh user@111.111.111.111 -D 8080 Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080
Websites
nmap.org - website for nmap software exploit-db.com http://www.dvwa.co.uk/
Software
Squid - webproxy chache
https://portswigger.net/burp Burpsuite web application testing
Nmap
nmap -vv -A website.com
ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file
nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt
Nslokup
nslookup google.com
using Grep with awk
Host: 10.0.0.14 () Status: Up grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}' prints out the sencond field cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt
Output 10.0.0.14
using nmap with above output to scan multiple host
nmap -iL scan.txt -vv
Script to give you info on a domain
curl ipinfo.io/ipaddress