Tryhackme:CC: Pen Testing(PART-1)

[Section 1 — Network Utilities] — nmap:

A:-p

A:-sn

A:-sU

A:-sC

A:-A

A:-O

A:-sV

A:1

[Section 1 — Network Utilities] — Netcat:

A:-l

A:-v

A:-p

A:-e

A:-u

[Section 2 — Web Enumeration] — gobuster:

[Section 2 — Web Enumeration] — nikto:

[Section 3 — Metasploit]: Intro:

[Section 3 Metasploit]: Setting Up:

[Section 3 — Metasploit]: — Selecting a module:

[Section 3 — Metasploit]: meterpreter:

[Section 3 — Metasploit]: Final Walkthrough:

Section 4 — Hash Cracking]: Intro:

[Section 4 — Hash Cracking]: Salting and Formatting:

--

--

--

CTF-PLAYER, security analyst, Pentesting, vapt, digital forensics

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

SPOOFING AND SECURITY

The Benefits of Encryption and How it Works

Mobile phone with screen showing data encryption

Amazon App Flow

{UPDATE} Big Bang Racing Hack Free Resources Generator

Security Chaos Engineering: It’s Hip, It’s Now, It’s Wow!

Stop Active Directory Reconnaissance for sensitive infrastructure, once in for all!

The CA privacy law effective Jan 1 will set the tone for US regulation

New SmartEscrow Site Launched, Live Demo event coming January 13th!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
jagadeesh

jagadeesh

CTF-PLAYER, security analyst, Pentesting, vapt, digital forensics

More from Medium

Secondary Research/Analogous

NodeBitsDAO Progress Update #1

Burning CROD tokens

Post-Graduation Update