From accidentally climbing the blog
It hurts. as you write your hand, medusa is still quick to crack. First, let's take a look at the help.
Root @ perl-exploit:/pentest/exploits/framework3 # medusaMedusa v1.5 [http://www.foofus.net] (C) JoMo-Kun/Foofus Networks
ALERT: Host information must be supplied.
Syntax: medusa [-h host |-H file] [-u username |-U file] [-p password |-P file] [-C file]-M module [OPT]-H [TEXT]: Target hostname or IP address-H [FI
version of the corresponding operating system
root@bt:/pentest/database/sqlmap/udf/mysql# LS
linux windows
root@bt:/pentest/database/sqlmap/udf/mysql/ linux# ls
root@bt:/pentest/database/sqlmap/udf/mysql/linux/64# ls
lib_mysqludf_sys.so
3, using the UDF library file to load functions and execute commandsFirst you get the hexadecimal format of the U
researchers and Project Leader (practitioners) in the software development field is the one that truly determines the success or failure of the project. Otherwise, the academic community will invest a lot of time to study the factors that do not matter for the project's success or failure. The project leader will put a lot of manpower and material resources into aspects that are irrelevant to the project (as Cockburn pointed out: the environment humidity in the development site? So what is this
Webug customs clearance of the real record1.Get injected, put it in the Sqlmap and run for a minute.First look at which database he usesSqlmap.py-u "Http://192.168.244.134/pentest/test/sqli/sqltamp.php?gid=1"-D pentesterlab--tablesSqlmap.py-u "Http://192.168.244.134/pentest/test/sqli/sqltamp.php?gid=1"-D pentesterlab-t Flag--columnsSqlmap.py-u "Http://192.168.244.134/pe
Nikto Automatically scans for outdated, unpatched software on the Web server and automatically retrieves dangerous files residing on the server. can identify a number of specific problems, but also can check out the server configuration problems. /pentest/web/nikto #./nikto.pl–h target_host–p Target_port–o Output_file_path #./nikto.pl Update Websecurify Quickly and easily identify web vulnerabilities, including SQL injection, cross-site scripting, te
Object-oriented Basic conceptsGeogo in Shenzhen (2007-01-13)Object-oriented (object-oriented; short: OO)So far there is no unified concept, I define it as: according to people to understand the objective world system thinking mode, the use of object-based (entity) concept to establish a model, simulation of the objective world analysis, design, implementation of the software approach. Through the object-oriented concept, the computer software system can correspond with the real-world system one
0. Introduction of toolsThe purpose of Dnsenum is to gather as much information as possible about a domain. The program currently performs the following operations:1) Get The host ' s Addresse (A record). 2) Get the Namservers (threaded). 3) Get the MX record (threaded). 4) Perform AXFR queries on nameservers and get BIND versions (threaded). 5) Get extra names and subdomains via Google scraping (google query = "Allinurl:-www site:domain"). 6) Brute force subdomains from file, can also perform r
First we find an injected station: Here I use my own environment to express; Let's not mess around.Http://localhost/pentest/sql/sql_injection_get.php?id=1Discovery is root permission, we try to write the horse directlyFirst, find the Web site's home directory:Database directory: D:\wamp\bin\mysql\mysql5.5.20\data\To judge, the server may be wampserver, httpd.conf file in d:/wamp/bin/apache/apache2.2.21/conf/httpd.confHttp://localhost/
identification:P0f-i Eth0-u-P turn on promiscuous mode.Xprobe2 ip| domain name detection os. Banner get:The NC IP Port detects if the port is open.Telnet IP Port detects if the port is open.wget IP Download Home page.Cat Index.html | More displays the page code.Q Exit. Windows enumerationNmap-ss-p 139,445 IP Scan windows.Cd/pentest/enumeration/smb-enumNbtscan-f Targetip detects NetBIOS.Smbgetserverinfo-i targetip Scan Name,os, group.Smbdumpusers-i Ta
server open ports, using the Penetration test tool Nmap:1-find Services, the run on server (view service running on the server)2-find Server OS (view OS version)We will also use the W3AF tool in backtrack 5 R1:[Email Protected]:/pentest/web/w3af#./w3af_guiWe enter the address of the website to be detected and select the Complete security audit option.Wait a moment, and you'll see the results of the scan.Discover that your site has SQL injection vulne
, we are not stealing the intellectual property of these companies, so we may be sentGo to jail (Laugh), learn how they do things, like Apple P G)How does an office design company (Steelcase) do things, steal the methodology of the scholar's house, see the successful people's place, and then correct their own process. Q: designers are T-type talents.A: Because the design is very complicated, we need people with expertise and breadth to do this.We ha
knowledge is not only about details, but also about its methodology for solving problems, this methodology is somewhat unique and is derived from the post-war research and conclusion on the running mode of the German general staff for more than one hundred years. This methodology is the core. What is interesting is that the core experience of SAP comes from this
Document directory
Coding Practice | programming practices
Architecture Design | Architecture and Design
Methodology | Methodology
Thought Leadership | ideology and Leadership
Reference: http://agiledon.github.io/blog/2013/04/17/thoughtworks-developer-reading-radar/
The software industry is characterized by changes. To improve software development skills, you must keep up with the pace of technol
product requirements that must be met by the project
The purpose of the project or the reason for project establishment
Delegated permission levels for project managers and project managers
Milestone Progress Plan for the overview
Impact of Project stakeholders
Functional organizations and their participation
Organizational, environmental, and external assumptions
Organizational, environmental, and external constraints
Demonstrate the project's business plan, inc
The reason why I wrote these columns is that many people are puzzled when using Linux. As a hacker, Linux skills are irreplaceable attack tools.
Because Linux has a file directory structure different from Mac OS and Windows, many new users will have a question when they first use Linux-how to find files. Before starting, make sure that you have mastered the contents of my previous articles (1, 2, and 3 ).
Step 1: find a file in the directory)
The first one to show you is the find command. Litera
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.