This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| security [2022/07/03 11:19] – jotasandoku | security [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| **NETCAT (NC) NC NOTES** | **NETCAT (NC) NC NOTES** | ||
| + | # for tcp | ||
| nc -kl {port} | nc -kl {port} | ||
| - | nc -v 192.168.2.119 37657 <-- Alternatively we can use telnet 192.168.2.119 37657 | + | nc -zv 19.168.2.119 37657 <-- Alternatively we can use telnet 192.168.2.119 37657 |
| nc -z -v -w1 google.es 443 | nc -z -v -w1 google.es 443 | ||
| + | # for udp. You need to type some text and see if it appears on the receiver | ||
| + | nc -luk 192.168.0.112 7777 # listens on UDP | ||
| + | nc -uv 192.168.0.112 7777 # opens terminal so we can send datagrams | ||
| + | while true; do dd if=/ | ||
| | | ||
| | | ||
| Line 17: | Line 22: | ||
| nmap -O 192.168.2.1 <-- To determine the OS (this uses stack fingerprint!. No really open ports are required) | nmap -O 192.168.2.1 <-- To determine the OS (this uses stack fingerprint!. No really open ports are required) | ||
| nmap -vv host.target.com | nmap -vv host.target.com | ||
| - | nmap -sP 10.0.0.0/24 # will scan the 256 hosts | + | nmap -sP 10.0.0.0/24 # will scan the 256 hosts for reachability |
| + | nmap < | ||
| | | ||
| SCRIPTS: | SCRIPTS: | ||
| Line 41: | Line 47: | ||
| ---- | ---- | ||
| HPING NOTES: | HPING NOTES: | ||
| - | \\ | + | [[https:// |
| hping3 --help | hping3 --help | ||
| + | hping3 -c 15000 --icmp --flood --rand-source 192.168.100.3 | ||
| + | hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.100.3 | ||
| + | hping3 | ||
| hping3 -S -p 443 -c 3 google.com | hping3 -S -p 443 -c 3 google.com | ||
| # volumetric attacks | # volumetric attacks | ||
| hping3 --flood --spoof < | hping3 --flood --spoof < | ||
| + | hping3 --syn --flood < | ||
| + | hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source # SYN-flood (datagram 120B) | ||
| + | | ||
| ---- | ---- | ||
| Line 52: | Line 64: | ||
| **KALI LINUX**\\ | **KALI LINUX**\\ | ||
| * [[https:// | * [[https:// | ||
| + | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| - | * | + | |
| ---- | ---- | ||
| + | |||
| **CURIOUS SOURCE PORTS** | **CURIOUS SOURCE PORTS** | ||
| Line 60: | Line 74: | ||
| Not a comprehensive list but source ports are useful to understand what vulnerability has been exploited in the reflection network. | Not a comprehensive list but source ports are useful to understand what vulnerability has been exploited in the reflection network. | ||
| * (19) chargen [[https:// | * (19) chargen [[https:// | ||
| + | * (1985) hsrp | ||