Posts

Showing posts from January, 2020

List of One-liner Web Servers

Python 2.x $ python -m SimpleHTTPServer 8000 Python 3.x $ python -m http.server 8000 Twisted (Python) $ twistd -n web -p 8000 --path . Or: $ python -c 'from twisted.web.server import Site; from twisted.web.static import File; from twisted.internet import reactor; reactor.listenTCP(8000, Site(File("."))); reactor.run()' Depends on Twisted. Ruby $ ruby -rwebrick -e'WEBrick::HTTPServer.new(:Port => 8000, :DocumentRoot => Dir.pwd).start' Credit: Barking Iguana Ruby 1.9.2+ $ ruby -run -ehttpd . -p8000 Credit: nobu adsf (Ruby) $ gem install adsf   # install dependency $ adsf -p 8000 Credit: twome No directory listings. Sinatra (Ruby) $ gem install sinatra   # install dependency $ ruby -rsinatra -e'set :public_folder, "."; set :port, 8000' No directory listings. Perl $ cpan HTTP::Server::Brick   # install dependency $ perl -MHTTP::Server::Brick -e '$s=HTTP::Server::Brick->new(port=>8000); $s->mo...

List of CTF Labs

CTF Labs HackTheBox https://www.hackthebox.eu Vulnhub https://www.vulnhub.com Practical Pentest Labs https://practicalpentestlabs.com Labs Wizard Security https://labs.wizard-security.net Pentestlab https://pentesterlab.com/ Hackthis https://www.hackthis.co.uk Shellter https://shellterlabs.com/pt/ Root-Me https://www.root-me.org/ Zenk-Security https://www.zenk-security.com/epreuves.php W3Challs https://w3challs.com/ NewbieContest https://www.newbiecontest.org/ The Cryptopals Crypto Challenges https://cryptopals.com/ Penetration Testing Practice Labs http://www.amanhardikar.com/mindmaps/Practice.html alert(1) to win https://alf.nu/alert1 Hacksplaining https://www.hacksplaining.com/exercises Hacker101 https://ctf.hacker101.com Academy Hackaflag https://academy.hackaflag.com.br/ PentestIT LAB https://lab.pentestit.ru Hacker Security https://capturetheflag.com.br/ PicoCTF https://picoctf.com Explotation Education https://expl...

INPT- Nmap Scanning with Metasploit-

Initial Setup & Workspaces The first thing we need to do, if it is not done already, is start the PostgreSQL service that Metasploit's  database  uses, with the  systemctl start postgresql  command. systemctl start postgresql At any time, we can use the  status  keyword to check the current state of the service. systemctl status postgresql ● postgresql.service - PostgreSQL RDBMS Loaded: loaded (/lib/systemd/system/postgresql.service; disabled; vendor preset: disabled) Active: active (exited) since Tue 2019-01-15 09:11:42 CST; 1min 6s ago Process: 1708 ExecStart=/bin/true (code=exited, status=0/SUCCESS) Main PID: 1708 (code=exited, status=0/SUCCESS) Jan 15 09:11:42 drd systemd[1]: Starting PostgreSQL RDBMS... Jan 15 09:11:42 drd systemd[1]: Started PostgreSQL RDBMS. We can initialize the actual database with the  msfdb  command, which creates the default user, database, and relevant information pertaining to the database. ...