Cheat Sheets!!!
https://www.technoherder.com/PenTestStudyNotes/common_ports.pdf https://www.technoherder.com/PenTestStudyNotes/Metasploit_Cheat_Sheet.pdf https://www.technoherder.com/PenTestStudyNotes/netcat_cheat_sheet_v1.pdf
Knowledge Base for Penetration Testing
https://www.technoherder.com/PenTestStudyNotes/common_ports.pdf https://www.technoherder.com/PenTestStudyNotes/Metasploit_Cheat_Sheet.pdf https://www.technoherder.com/PenTestStudyNotes/netcat_cheat_sheet_v1.pdf
There are some attacks that you can use to test the physical security of the target’s hosts, rather than testing them from a purely virtual space. Note that these tests are technical in nature, and usually involve vulnerabilities in how the host’s hardware is configured. Also, these attacks are not OS-specific—because they are hardware-based, they […]
A sandbox is any environment used to isolate a computer process away from other processes, as well as the host. The process that is being isolated is called the guest. The computer that houses the sandbox (with guest) is called the host. A sandbox escape is any type of exploit that allows the guest process […]
Metasploit is a multi-purpose computer security and penetration testing framework. Intentionally modular, it allows the attacker to mix and match scanners, exploits, and payloads into a single attack. Originally created by H.D. Moore for security analysis, it was later acquired by Rapid7, which added more intuitive, GUI-based commercial versions. Metasploit is considered to be the […]