Index

KALI

  1. LINUX COMMANDS
  2. NETWORK COMMANDS
  3. PYTHON BASICS

STAGES

  1. RECONNAISSANCE
  2. SCANNING TOOLS
  3. ENUMERATION
    1. KIOPTRIX
      1. VULN
        1. Default_webpage(low)
        2. Server_header info desclosure(low)
        3. Default404_infodisclosure
        4. Weak Ciphers
        5. smb_findings
  4. EXPLOITATION

EXPLOITATION

Reverse Shell
Bind Shell
:open a malicious port


Payloads
Non-Staged:
• Sends exploit shellcode at once
• Larger in size, might fail
• Ex: windows/meterpreter_reverse_tcp

Staged:
• Sends payload in stages
• Can be less stable
• Ex: windows/meterpreter/reverse_tcp

openFuck
images/16-1.png