Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other nodes. Instead, when one node wants to send traffic to another node that it isn’t directly connected to, it sends the traffic to a gateway node, which forwards the traffic… Continue reading Routing Network Traffic : For Traffic Capture
Category: Offensive Security
Pen-testing Commands Part 1
Hash Cracking – Jhon Unzip /usr/share/worllists/rockyou.txt.gz jhon Foot-printing Websites or Webserver Nikto nikto -e 1 -h mysite.com -e the evasion switch, 1 random number for encoding, -h for define IP or hostname The Harvester theharvester -d example.com -i 50 b google -h myresults.html -d is the domain or company name to search. -i limit results.… Continue reading Pen-testing Commands Part 1
Google Reconnaissance or Foot-printing
filetype:type – Searches for only files with specific type. Example ; filetype:pdf intitle:string – searches for pages contains string in title. Example: intitle:login inurl:url – displays pages with url in pages. site:domain – can be combined with other searches. Example: site:microsoft.com passwd. would return all pages with text ”passwd’ in microsoft.com