Chapter 1 - Cheatsheets

NMAP

Network Scan

Arguments

-sn - ping scan (disable port scan, assumes all hosts up)
-sP - ping scan (skip host discovery, only shows hosts that respond) 
-sL - scan list
-Pn - no ping, just scan

Examples

Kali> nmap -sn 192.168.1.0/24
Kali> nmap -sP 192.168.1.0/24
Kali> nmap -sL IPlist.txt
Kali> for ip in $(cat targets.txt);do nmap -A -T4 -oN scans/nmap.$ip.txt $ip;done

Host Scan

Arguments

-p- {1-65535} - 1 to 65535 ports
-p 22,80,443 - specificed ports
-6 - ipv6
-O - OS Detection
--osscan-limit - light os scan
--osscan-guess - aggressive os scan
--version-intensity {0-9} - light to aggressive
-sV - version detection
-sT - connect scan
-sU - UDP scan
-sS - stealth syn scan
-sN - tcp null scan
-sC - default scripts
-A - OS detection + nmap scripts + traceroute + version
--script {script.nse} - load specific nmap script
--script-args={args} - pass arguments to script

Examples

Timing

Arguments

Evasion

Arguments

Output

Arguments

MSFVenom

Arguments

Examples

List Payloads msfvenom -l

Creates a simple TCP payload for Windows

BurpSuite

Setup

Intercept Traffic

Shortcuts

MSFConsole

Reverse TCP

Jobs

GDB

Commands

Examples

WinDBG

Commands

Examples

Shortcuts

ImmunityDebugger

Shortcuts

Mona

Arguments

Examples

Limited Shells

Resources

Reverse Shells

Reverse Shell to Fully Interactive

Linux

Windows

Default Credentials

A list of potentially useful default credentials to try out by hand.

Otherwise, here is a link you can look through and CTRL+F for a vendor should it apply. github.com/danielmiessler/SecLists

Last updated

Was this helpful?