Hacking

From rbachwiki
Revision as of 22:15, 8 August 2016 by Bacchas (talk | contribs)
Jump to navigation Jump to search

Port Tunneling and Socks5 Proxies with a Secure Shell (SSH)

ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made to the specified port goes through the tunnel as a SOCKS4 or SOCKS5 proxy. Perfect for secure web browsing

Usage: ssh user@111.111.111.111 -D 8080

Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080

Websites

nmap.org - website for nmap software exploit-db.com http://www.dvwa.co.uk/

Software

Squid - webproxy chache

https://portswigger.net/burp Burpsuite web application testing

Nmap

nmap -vv -A website.com

ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file

nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt

Nslokup

nslookup google.com

using Grep with awk

Host: 10.0.0.14 () Status: Up grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}' prints out the sencond field cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt

Output 10.0.0.14

using nmap with above output to scan multiple host

nmap -iL scan.txt -vv

Script to give you info on a domain

curl ipinfo.io/ipaddress