01 Ethical Hacking Introduction

List of Content

  1. Network Hacking
  2. Gaining Access
  3. Post Exploitation
  4. Website Hacking

1. Setting up the Lab

  • Download VirtualBox and VirtualBox Extension Pack
  • Download Kali Linux
  • Install and enter Kali linux
    • Default Username: root
    • Default Password: toor

2. Linux Command

Reference and Descriptions

CommandDescriptionExample
lsList information about file(s)ls -la
cdchange directorycd /opt/test
pwdPrint Working Directorypwd
touchChange file timestamps or Create a new filetouch desc.txt
mkdirDisplay a calendarmkdir -p /opt/test/img
catConcatenate files and print on the standard outputcat desc.txt
moreDisplay output one screen at a timemore desc.txt
tailOutput the last part of filestail -100 desc.txt
cpCopy one or more files to another locationcp desc.txt /mnt/
cp -r test /mnt/
mvMove or rename files or directoriesmv desc.txt /mnt/
rmRemove filesrm -rf test
findSearch for files that meet a desired criteriafind /opt -name '*.txt'
lnMake links between filesln -s /opt/test ./link2test
ifconfigdisplay current network configuration informationifconfig
netstatdisplay network connectionsnetstat -a
psProcess statusps -ef
ps-ef | grep java
duEstimate file space usagedu -h /opt/test
dfDisplay free disk spacedf -h
topList processes running on the systemtop
killStop a process from runningkill -s 9 27810
tarTape Archiver Compress: tar -zcvf test.tar.gz ./test
Unzip: tar -zxvf test.tar.gz
chownChange the user and group ownership of fileschown nginx:nginx desc.txt
chown -R nginx:nginx test
chmodChange the access permissions of files and directorieschmod u+x test.sh
chmod u+x -R test
vim / viText Editorvim desc.txt
vi hello.txt
shutdownshutdown your computershutdown -h now
shutdown -r -t 60
manHelp manualman ls
apt-get updateUpdate the list of programs your can install
apt-get installInstall the program you wantapt-get install terminator

Use --help as any Command option for help


3. Network Hacking

  • Pre-connection Attacks
  • Gaining Access
  • Post-connection Attacks
Why change the MAC adrress
  1. Increase anonymity
  2. Impersonate other devices
  3. Bypass filters
How to change the MAC adrress
  1. use ifconfigto list all the network interfaces available
  2. the MAC address is after ether
  3. use ifconfig [devicename] downto turn down the device you want to change
  4. use ifconfig [devicename] [option] [value]to turn down the option you want to change
  5. eg: ifconfig wlan hw ether 00:11:22:33:44:55

  6. use ifconfig [devicename] upto turn on
Wireless Modes(Managed & Monitor)
  1. use iwconfigto check your modes
  2. use ifconfig [devicename] downto turn down the device you want to change
  3. use airmon-ng check killto list the running process
  4. use iwconfig [devicename] mode monitorto change your mode into monitor
  5. use ifconfig [devicename] upto turn on
Packet Sniffing Basics using Airodump-ng
  • use airodump-ng [devicename] to list all networks around
  • 在这里插入图片描述

  • use airodump-ng --band -a [devicename] to only detect 5GHz bands

  • use airodump-ng --band -abg [devicename] to detect both 5GHz & 2.4GHz

  • use airodump-ng --bssid [MAC Address] --channel [CH] --write [filename] [devicename]to target

  • Deauthentication Attack (Disconnect Any Device from the Network)

    use aireplay-ng --deauth [Time] -a [MAC1] -c [MAC1] [devicename]

    • TIME: e.g. 100000000
    • MAC1: Target Router
    • MAC2: Client
    ~# airodump-ng --bssid 74:05:A5:53:3E:10 --channel 11 wlan0
    ~# aireplay-ng --deauth 1000000 -a 54:75:95:75:8A:91 -c 9C:E3:3F:76:5C:8C wlan0
    
资源下载链接为: https://pan.quark.cn/s/3d8e22c21839 随着 Web UI 框架(如 EasyUI、JqueryUI、Ext、DWZ 等)的不断发展与成熟,系统界面的统一化设计逐渐成为可能,同时代码生成器也能够生成符合统一规范的界面。在这种背景下,“代码生成 + 手工合并”的半智能开发模式正逐渐成为新的开发趋势。通过代码生成器,单表数据模型以及一对多数据模型的增删改查功能可以被直接生成并投入使用,这能够有效节省大约 80% 的开发工作量,从而显著提升开发效率。 JEECG(J2EE Code Generation)是一款基于代码生成器的智能开发平台。它引领了一种全新的开发模式,即从在线编码(Online Coding)到代码生成器生成代码,再到手工合并(Merge)的智能开发流程。该平台能够帮助开发者解决 Java 项目中大约 90% 的重复性工作,让开发者可以将更多的精力集中在业务逻辑的实现上。它不仅能够快速提高开发效率,帮助公司节省大量的人力成本,同时也保持了开发的灵活性。 JEECG 的核心宗旨是:对于简单的功能,可以通过在线编码配置来实现;对于复杂的功能,则利用代码生成器生成代码后,再进行手工合并;对于复杂的流程业务,采用表单自定义的方式进行处理,而业务流程则通过工作流来实现,并且可以扩展出任务接口,供开发者编写具体的业务逻辑。通过这种方式,JEECG 实现了流程任务节点和任务接口的灵活配置,既保证了开发的高效性,又兼顾了项目的灵活性和可扩展性。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值