Category:Penetration-testing
Penetration-testing
Penetration testing (shortened pentesting) is the art of assessing the security of an environment and, eventually, discovering vulnerabilities (sometimes also exploiting vulnerabilities to confirm them). Penetration-testing is also called hacking (hackers, white hats), and differs from cracking (crackers, black hats) in the motivations. The hacker is a security professional who acts with ethics whereas crackers act without rules. Crackers' motivations are challenges (e.g. deface a web site), data theft, vandalism and destruction.
Seclists
https://github.com/danielmiessler/SecLists
Web
Web application attacks
Common web application attacks (XSS, LFI, RFI, sessions, ...) are here: Web-applications-attacks
Read file
Here are some commands that enable to read a file:
- cat <file>
- head <file>
- more <file>
- less <file>
- tail <file>
- xxd <file>
- nano <file>
- vim <file>
- vi <file>
- grep <file>
- grep -R . (reads all files in the directory)
- echo < readme.txt
- while read line; do echo $line; done < clue.txt
- rev /home/ubuntu/flag5.txt | rev
Hacking tutorials
Comments
Subcategories
This category has the following 34 subcategories, out of 34 total.
I
- Information-gathering (105)
P
Pages in category "Penetration-testing"
The following 200 pages are in this category, out of 308 total.
(previous page) (next page)0
5
A
- Aircrack-ng
- Aircrack-ptw
- Airdecap-ng
- Airodump-ng
- Airsnort
- Airtun-ng
- Angry-IPScan
- Arachni
- Armitage
- Arping
- Attaques
- Attaques/Applications-et-Systeme-Exploitation
- Attaques/Applications-et-Systeme-Exploitation/Attaques-applications-web
- Attaques/Applications-et-Systeme-Exploitation/Attaques-mots-de-passe
- Attaques/Applications-et-Systeme-Exploitation/Attaques-navigateurs
- Attaques/Applications-et-Systeme-Exploitation/Buffer-overflow
- Attaques/Enumeration-Scanning
- Attaques/Enumeration-Scanning/Decouverte-cartographie-reseau
- Attaques/Enumeration-Scanning/Detection-vulnerabilites
- Attaques/Enumeration-Scanning/Prise-empreintes
- Attaques/Enumeration-Scanning/Scan-ports
- Attaques/Reseau
- Attaques/Reseau/Deni-de-service
- Attaques/Reseau/IP-spoofing
- Attaques/Reseau/Sniffing
- Attaques/Reseau/Vol-session
- AuditSecuriteApplicationsWeb
- AuditSecuriteApplicationsWeb:GoogleHacks
- AuditSecuriteApplicationsWeb:RATS
- Autoscan
B
- Backtrack
- Backtrack/Digital-forensics
- Backtrack/Digital-forensics/Anti-forensics
- Backtrack/Digital-forensics/File-carving
- Backtrack/Digital-forensics/Forensics-analysis
- Backtrack/Digital-forensics/Image-acquiring
- Backtrack/Information-gathering
- Backtrack/Information-gathering/Archive
- Backtrack/Information-gathering/DNS
- Backtrack/Information-gathering/Route
- Backtrack/Information-gathering/Search-engine
- Backtrack/Maintaining-access
- Backtrack/Maintaining-access/Backdoors-and-rootkits
- Backtrack/Maintaining-access/Tunneling
- Backtrack/Miscellaneous
- Backtrack/Network-mapping
- Backtrack/Network-mapping/Identify-live-hosts
- Backtrack/Network-mapping/OS-fingerprinting
- Backtrack/Network-mapping/Portscanning
- Backtrack/Network-mapping/Service-fingerprinting
- Backtrack/Network-mapping/VPN
- Backtrack/Penetration
- Backtrack/Privilege-escalation
- Backtrack/Privilege-escalation/Password-attacks
- Backtrack/Privilege-escalation/Password-attacks/Offline-attacks
- Backtrack/Privilege-escalation/Password-attacks/offline/Rainbowcrack
- Backtrack/Privilege-escalation/Password-attacks/Online-attacks
- Backtrack/Privilege-escalation/Sniffers
- Backtrack/Privilege-escalation/Spoofing
- Backtrack/Radio-network-analysis
- Backtrack/Radio-network-analysis/802.11
- Backtrack/Radio-network-analysis/802.11/Cracking
- Backtrack/Radio-network-analysis/802.11/Misc
- Backtrack/Radio-network-analysis/802.11/Spoofing
- Backtrack/Radio-network-analysis/Bluetooth
- Backtrack/Radio-network-analysis/RFID
- Backtrack/Radio-network-analysis/RFID/RFIDIOt-ACG
- Backtrack/Radio-network-analysis/RFID/RFIDIOt-Frosch
- Backtrack/Radio-network-analysis/RFID/RFIDIOt-PCSC
- Backtrack/Reverse-engineering
- Backtrack/Voice-over-ip
- Backtrack/Voice-over-ip/Voip-analysis
- Backtrack/Voice-over-ip/Voip-analysis/Signalling
- Backtrack/Vulnerability-identification
- Backtrack/Vulnerability-identification/Cisco
- Backtrack/Vulnerability-identification/Fuzzers
- Backtrack/Vulnerability-identification/SMB-analysis
- Backtrack/Vulnerability-identification/SNMP-analysis
- Backtrack/Web-application-analysis
- Backtrack/Web-application-analysis/Database
- Backtrack/Web-application-analysis/Database/MSSQL
- Backtrack/Web-application-analysis/Database/MySQL
- Backtrack/Web-application-analysis/Database/Oracle
- Backtrack/Web-application-analysis/Web
- Bed
- BlindElephant
- BurpSuite
- BurpSuite:Comparer
- BurpSuite:Decoder
- BurpSuite:Intruder
- BurpSuite:Menu
- BurpSuite:Proxy
- BurpSuite:Repeater
- BurpSuite:Scanner
- BurpSuite:Sequencer
- BurpSuite:Spider
- BurpSuite:Target
- BurpSuite:Telechargement Installation Parametrage
C
- CeWL
- Cms-explorer
- Cobalt-Strike
- Cobalt-Strike/Artifact-Kit
- Cobalt-Strike/Attacks
- Cobalt-Strike/Attacks/Packages
- Cobalt-Strike/Attacks/Packages/HTML-application
- Cobalt-Strike/Attacks/Packages/MS-Office-Macro
- Cobalt-Strike/Attacks/Packages/Payload-Generator
- Cobalt-Strike/Attacks/Packages/Windows-Executable
- Cobalt-Strike/Attacks/Spear-Phish
- Cobalt-Strike/Attacks/Web-Drive-by
- Cobalt-Strike/Attacks/Web-Drive-by/Clone-Site
- Cobalt-Strike/Attacks/Web-Drive-by/Host-File
- Cobalt-Strike/Attacks/Web-Drive-by/Scripted-Web-Delivery
- Cobalt-Strike/Attacks/Web-Drive-by/Signed-Applet-Attack
- Cobalt-Strike/Attacks/Web-Drive-by/Smart-Applet-Attack
- Cobalt-Strike/Attacks/Web-Drive-by/System-Profiler
- Cobalt-Strike/Beacon-Commands
- Cobalt-Strike/Examples
- Cobalt-Strike/Listeners
- Cobalt-Strike/Listeners/Beacon-DNS
- Cobalt-Strike/Listeners/Beacon-HTTP
- Cobalt-Strike/Listeners/Beacon-SMB
- Cobalt-Strike/Listeners/Beacon-TCP
- Cobalt-Strike/Listeners/External-C2
- Cobalt-Strike/Resource-Kit
- Complemento
- Complemento/Httsquash
- Complemento/LetDown
- Complemento/ReverseRaider
- CWE-SANS-Top-25/Insecure-interaction-between-components/CWE-434
E
F
I
- Idlescan
- Ike-scan
- Inguma
- Inguma/CLI
- Inguma/CLI/KB-report
- Inguma/CLI/Modules:Brute
- Inguma/CLI/Modules:Discover
- Inguma/CLI/Modules:Exploits
- Inguma/CLI/Modules:Exploits/Exploitdb
- Inguma/CLI/Modules:Fuzzers
- Inguma/CLI/Modules:Gather
- Inguma/CLI/Modules:Rce
- Inguma/CLI/Scan-Exploits
- Inguma/GUI
- Inguma/Installation
- IRPAS/Itrace
- IRPAS/Netenum
- IRPAS/Protos
- IRPAS/Tctrace
- Ivstools