EXTRA CONTENT
extract .tar.gz file -> tar xzf archive.tar.gz
WEB APPS VULNERABILITY SCAN:
With wmap:
In meterpreter:
load wmap -> wmap_TAB (to see commands)
wmap_sites -h (to specify a webpage to scan)
wmap_sites -a IPobj (add that page/IP to wmap)
wmap_targets -h (if we have more targets)
wmap_targets -t http://IPobj/youcanspecifyadirectory (to input targets)
wmap_run -h (run auxiliar modules to detect vulns)
wmap_run -t (displays the auxiliar modules that we can use and try some basics like http-version, etc)
With NIKTO:
TUTORIAL NIKTO WEB APP VULN SCAN
With WPscan (wordpress scan):
CROSS COMPILING EXPLOITS:
pre compiled to download and use directly
or:
Select the exploits to compile or cross compile:
The C language exploits should have information for how to compile with con mingwif they are well configured, if you don't find the information use the default mode for compiling.
Windows:
x64:
i686-w64-mingw32-gcc exploit.c -o exploit (export to portable executable)
if a error is shown, after -gcc there are more -args, tab too see them.
x32:
i686-w64-mingw32-gcc exploit.c -o exploit -lws2_32
Linux:
use gcc directly.
REVERSE SHELLS CHEATSHEET:
Last updated