CheatSheet
Introduction
In this section, I will share a list of the commands that I found most useful in the different phases of the exam, with the options that, in my case, worked best and allowed me to pass.
Recon
Fping
fping -a -g-a: This option indicates that the IP addresses of hosts that are active on the network should be displayed. -g: This argument specifies that the ping is to an IP range.
Nmap
nmap -sn 192.168.100.0/24-sn: This option indicates a “ping scan”; it does not scan ports, it only checks if the hosts are active.
Another alternative to network reconnaissance, which would be the same as the previous one from Nmap. Copy and paste directly into the terminal.
Linux
for i in {1..254} ;do (ping -c 1 192.168.1.$i | grep “bytes from” &) ;doneWindows
for /L %i in (1,1,255) do @ping -n 1 -w 200 192.168.1.%i > nul && echo 192.168.1.%i is up.Enumeration
Here I will group together the commands for identifying ports, services, versions, users, etc.
Nmap
The nmap tool will be our best ally for performing a thorough reconnaissance of the hosts on the network and the services they are running.
-sC: Execution of default scripts, which allow us to identify vulnerabilities to which the service may be vulnerable or obtain additional information.
-sV: Identifies the version of the service running on the port, allowing us to know if that service is vulnerable to any known vulnerabilities.
-O: Determines the operating system running on the target system.
Curl
During my exam, I encountered two machines running CMS, each running a different one. To obtain the information requested in one of the questions, I used the following commands:
Metasploit
Metasploit has enumeration modules for different services, which is a good alternative if you don't know specific tools or methods.
Enum4linux
For a Linux system, one of the enumeration tools you can use is:
Exploitation
Metasploit
Thanks to its modules, you can use it to exploit multiple services.
Basic commands:
Brute Force
In the course labs, brute force is a recurring technique, and this is also the case in the exam.
It will make it much easier for you to obtain user credentials. For me, the winning combination was hydra with rockyou.txt.
Post-Exploitation
Once you have gained access to the target system, you will need to navigate through it to find what you are looking for. To do this, you will need to use system commands, depending on the system you are attacking. Here are some examples of commands I had to use:
Última actualización