Hacking
Jump to navigation
Jump to search
Port Tunneling and Socks5 Proxies with a Secure Shell (SSH)
ssh -D. The -D option specified a local Dynamic application-level port forwarding. Any connection made to the specified port goes through the tunnel as a SOCKS4 or SOCKS5 proxy. Perfect for secure web browsing Usage: ssh user@111.111.111.111 -D 8080 Open firefox and change the network settings/Manual Proxy/Socks Host to: 127.0.0.1 Port 8080
Websites
nmap.org - website for nmap software exploit-db.com http://www.dvwa.co.uk/
Software
Squid - webproxy chache
https://portswigger.net/burp Burpsuite web application testing
Nmap
nmap -vv -A website.com
ip -255 means it will scan up to 255 p22 is scan for port 22 -vv is verbose, > redirect output into file
nmap -oG - 10.0.0.1-255 -p 22 --vv > /root/Desktop/scan.txt
Nslokup
nslookup google.com
using Grep with awk
Host: 10.0.0.14 () Status: Up grep Up filters the word Up, awk -F is a Field Filter, so we are filtering using blank space " " The last part '{print $2}' prints out the sencond field cat scan.txt | grep Up | awk -F " " '{print $2}' > scan2.txt
Output 10.0.0.14
using nmap with above output to scan multiple host
nmap -iL scan.txt -vv
Script to give you info on a domain
curl ipinfo.io/ipaddress