Post

Pentesting for Attack-type CTFs

Pentesting

Methodology

Scripts

Tools

Practice

Topics

Searchsploit

  • searchsploit [needle]
  • searchsploit -p [ID] # full path
  • searchsploit -m [ID] # mirror
  • searchsploit --nmap [file.xml] # nmap [host] -sV -oX file.xml

Windows

rpcclient -U “” [ip] lsaenumsid lookupsid [sid]

This post is licensed under CC BY 4.0 by the author.