Introduction


Introduction to Exploitation
Introduction To Exploitation



Vulnerability Scanning
Banner Grabbing

ifconfig eth1
#target 192.8.94.3
nmap -sV -O 192.8.94.3
# on the other hand , we can use nmap with script
ls -la /usr/share/nmap/scripts/ | grep banner
nmap -sV --script=banner 192.8.94.3


#netcat
whatis nc
man nc
nc 192.8.94.3 22
# many pentest rely on nmap you also can use netcat
searchsploit openssh 7.2
# we also can get banner
ssh root@192.8.94.3


Vulnerability Scanning With Nmap Scripts
#target 192.152.25.2
nmap -sV -O 192.152.25.3
ls -la /usr/share/nmap/scripts #Here is where the nmap script stored
ls -la /usr/share/nmap/scripts | grep http
nmap -sV --script=http-enum 192.152.25.3
nmap -sV -p80 --script=http-enum 192.152.25.3
searchsploit apache 2.4.6