Pentesting Notes

Software

Commands

Client-side Exploits

Disk Forensics

$ dd if=<in file> of=<out file>
$ mkdir <mountpoint>
$ mount -o loop -t <type> <image> <mountpoint>
$ foremost -i <image> -t all -v
$ scalpel

Post Exploitation

TCP/IP Tunneling

Anonymous Scanning

Other Anonymizing Notes

Note: scanning a hostname instead of IP will put a DNS request from your real IP in the logs–scan the direct IP instead. (see proxyresolv)

Setup iptables to disallow all traffic to target (forces you to send it over proxychains):

`iptables -A OUTPUT --dest <target ip> -j DROP`

Netcat

Misc