eJPT commands

This is a list of useful commands for the eJPT

Engagement -> Info gathering-> Footprinting & scanning -> Vuln Assessment -> exploitation -> Reporting

Information gathering -> footprinting & scanning

^ |

| | | / Explotation <-- Vuln assessment Add Route

ip route add ROUTETO via ROUTEFROM

ip route add 192.168.222.0/24 via 10.172.24.1       # Here 10.172.24.1 is the address of the gateway for subnet 192.168.222.0/24

Ping Sweep

Fping –a –g IPRANGE
nmap -sn 10.10.10.0/24

Vulnerability scanning with NMAP:

nmap –sV –script=vulnscan/vulnscan.nse target.site

Nmap scans:

nmap -sC -sV 10.10.10.10  // quick scan
nmap -sC -sV -p- 10.10.10.10 // Full scan
nmap -sU -sV 10.10.10.10    // UDP quick
nmap -Pn -O 10.10.10.10     // OS Detection

nmap -sV sC -T4 <ip> -oN out.nmap
nmap -sV -n -v -Pn -p- -T4 -iL ips.txt -A --open

Web applications

Webshell.php

Directory and File scanning

Cross Site Scripting (XSS):

SQLMap usage:

SQLMap - check for existence of SQL injection

If vulnerable parameter found then you can proceed with extraction of data from database

Password attacks:

Meterpreter: meterpreter is a shell that can run on any platforms after an exploit has been delivered:

Windows, Linux, java, php, python

Brute forcing with Hydra:

ARP spoofing

Null sessions

Wireshark only GET / POST requests

SecLists

Last updated