OSCP/도구 개념 정리

Nmap, Gobuster, JohnTheRipper

우와해커 2020. 4. 13. 15:49

Nmap

-p-: scan all port

-Pn: Disable host discovery and just scan for open ports

-sV: Service Scan

-sC: Scan with the default nmap scripts

-A: Enables OS and version detection, executes in-build scripts for further enumeration 

 

nmap -sV -vv --script vuln TARGET_IP
포트 명시 안하면 기본적으로 1000개를 검색한다.
--script vuln : 스크립트 파일명에 vuln이 포함된 nse파일을 검색한다.

 

 

GoBuster flag

gobuster dir -u http://:3333 -w

 

Description
-e: Print the full URLs in your console
-u: The target URL
-w: Path to your wordlist
-U and -P: Username and Password for Basic Auth
-p : Proxy to use for requests
-c : Specify a cookie for simulating your aut
-v: vervose
-t: thread
-o: output

 

Example
gobuster.exe -p http://127.0.0.1:9090 dir -w dictionary_1500.txt -v --wildcard -l -u https://test.com/ -t 5 -o 10619.txt

 

 

John The Ripper
root@kali:/THM# john --format=NT --wordlist=/root/Desktop/rockyou.txt hash.txt

'OSCP > 도구 개념 정리' 카테고리의 다른 글

Exploiting wildcards on Linux - 권한상승  (0) 2020.04.24
Meterpreter  (0) 2020.04.13
Systemctl  (0) 2020.04.13
Pivoting, 터널링, 포트포워딩, SSH, 프록시, Proxychains  (0) 2020.03.26
VIM 명령어 별도 정리  (0) 2020.02.05