Active Reconnaissance Hacking 101 Network Scan & Map Tools

Scanning with Nmap – Lab

Prereq – Have a local Kali instance running and Metasploitable2 for a target. https://hack.technoherder.com/vm-setup-kali-metasploitable2/ Part 1 – Setup Launch both Kali Linux and the Metasploitable2 VM and ensure that they are on the same isolated network. Chech which version of nmap you have installed. The nmap commands have evolved slightly over time.  It’s important to […]

Hacking 101

Docker Basics

The docker-compose.yml has ‘command’ property that shows how to start the app ( could be function called in package.json ). The default port for debugging is 9229 and will be in the docker-compose.yml file or append -p 9229:9229 to the docker-run command, example: Docker Commands Shut down the API gateway and all containers Start the […]

Hacking 101 Web App Attack

Cross-Origin Resource Sharing (CORS)

Notes https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS Same Origin Policy prevents one origin from accessing resources on a different origin, this includes JavaScript & HTTP Requests. Requests made by http://a.com/latest URL Result Reason https://a.com/myInfo Allowed Same Origin **http:**//a.com/users.json Blocked Different Schema and Port https://**api**.a.com/info Blocked Different Domain https://a.com**:8443**/file Blocked Different port https://**b**.com/analytics Blocked Different Domain Please note images and iframes […]

Hacking 101

CLI Quick Notes

XFreeRDP Samba Server 1 –  Create the folder that will be shared 2 –  Use the Impacket tool DONE –  from target they can now hit the attacker’s shared directory, for example in Windows Explorer SMTPD Start a SMPTD  server to listen for incoming SMTP connections and use the DebuggingServer flag to discard the messages […]