Chapter 1 - Cheatsheets
NMAP
Network Scan
Arguments
-sn - ping scan (disable port scan, assumes all hosts up)
-sP - ping scan (skip host discovery, only shows hosts that respond)
-sL - scan list
-Pn - no ping, just scan
Examples
Kali> nmap -sn 192.168.1.0/24
Kali> nmap -sP 192.168.1.0/24
Kali> nmap -sL IPlist.txt
Kali> for ip in $(cat targets.txt);do nmap -A -T4 -oN scans/nmap.$ip.txt $ip;doneHost Scan
Arguments
-p- {1-65535} - 1 to 65535 ports
-p 22,80,443 - specificed ports
-6 - ipv6
-O - OS Detection
--osscan-limit - light os scan
--osscan-guess - aggressive os scan
--version-intensity {0-9} - light to aggressive
-sV - version detection
-sT - connect scan
-sU - UDP scan
-sS - stealth syn scan
-sN - tcp null scan
-sC - default scripts
-A - OS detection + nmap scripts + traceroute + version
--script {script.nse} - load specific nmap script
--script-args={args} - pass arguments to script
Examples
Timing
Arguments
Evasion
Arguments
Output
Arguments
MSFVenom
Arguments
Examples
List Payloads msfvenom -l
Creates a simple TCP payload for Windows
BurpSuite
Setup
Intercept Traffic
Shortcuts
MSFConsole
Reverse TCP
Jobs
GDB
Commands
Examples
WinDBG
Commands
Examples
Shortcuts
ImmunityDebugger
Shortcuts
Mona
Arguments
Examples
Limited Shells
Resources
Reverse Shells
Reverse Shell to Fully Interactive
Linux
Windows
Default Credentials
A list of potentially useful default credentials to try out by hand.
Otherwise, here is a link you can look through and CTRL+F for a vendor should it apply. github.com/danielmiessler/SecLists
Last updated
Was this helpful?