Search the Community
Showing results for tags 'things'.
-
Night crawler is a project focused on designing an Internet of Things (IoT) search engine using some techniques to find devices in IPv4 blocks and then insert it into MongoDB. Features Banner Grabbing Whenever performing the intel-reconnaissance process during penetration testing or security auditing, we need to pay attention to the current web server’s exposed information. That’s where banner grabbing comes in. Banner grabbing is the act of getting software banner information (name and version), whether it’s done manually, or by using any OSINT tools that can do it for you automatically. FTP servers, web servers, SSH servers, and other system daemons often expose critical information about not only the software name but also about the exact versions and operating systems they’re running. Port Scanning Is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities. IP Geolocation IP Geolocation is the identification of the geographic location of a device, such as a mobile phone, gadget, laptop, server, and so on, by using an IP address. This search engine consumes an API to get the locations in JSON format. Screenshot Functions If it detects that a device has an HTTP service running, it sends a request to a server with Rendertron and saves a screenshot. [hide][Hidden Content]]
-
THINGS YOU CAN DO USING METASPOLIT FRAMEWORK 1. Pre-engagement interactions: This step defines all the pre-engagement activities and scope definitions, basically everything you need to discuss with the client before the testing starts. 2. Intelligence gathering: This phase is all about collecting information about the target under test, by connecting to the target directly or passively, without connecting to the target at all. 3. Threat modeling: This phase involves matching the information uncovered to the assets to find the areas with the highest threat level. 4. Vulnerability analysis: This involves finding and identifying known and unknown vulnerabilities and validating them. 5. Exploitation: This phase works on taking advantage of the vulnerabilities discovered in the previous phase. This typically means that we are trying to gain access to the target. 6. Post-exploitation: The actual tasks to perform at the target, which involve downloading a file, shutting a system down, creating a new user account on the target, and so on, are parts of this phase. This phase describes what you need to do after exploitation. 7. Reporting: This phase includes summing up the results of the test in a file and the possible suggestions and recommendations to fix the current weaknesses in the target.
-
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests 🙂 Every section contains the following files, you can use the _template_vuln folder to create a new chapter: README.md - vulnerability description and how to exploit it Intruder - a set of files to give to Burp Intruder Images - pictures for the README.md Files - some files referenced in the README.md You might also like the Methodology and Resources folder : Methodology and Resources Active Directory Attack.md Cloud - AWS Pentest.md Cloud - Azure Pentest.md Cobalt Strike - Cheatsheet.md Linux - Persistence.md Linux - Privilege Escalation.md Metasploit - Cheatsheet.md Methodology and enumeration.md Network Pivoting Techniques.md Network Discovery.md Reverse Shell Cheatsheet.md Subdomains Enumeration.md Windows - Download and Execute.md Windows - Mimikatz.md Windows - Persistence.md Windows - Post Exploitation Koadic.md Windows - Privilege Escalation.md Windows - Using credentials.md CVE Exploits [HIDE][Hidden Content]]
-
Exploits SSHtranger Things SCP Client File Issue
1337day-Exploits posted a topic in Updated Exploits
SCP clients have an issue where additional files can be copied over without your knowledge. View the full article-
- sshtranger
- things
- (and 4 more)