Helpful Command QR
Nmap scanning
ports=$(nmap -p- --min-rate=1000 -T4 <target-ip> | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)
nmap -p$ports -sC -sV <target-ip>
Shells
python3 -c 'import pty;pty.spawn("/bin/bash")'
Active Directory Enum
Emumerate users
ldapsearch -h x.x.x.x -x -b "DC=DOMAIN,DC=DOMAIN" -s sub "(&(objectclass=user))" | grep sAMAccountName: | cut -f2 -d" "
enum4linux -U x.x.x.x | grep "user:" | cut -f2 -d"[" | cut -f1 -d"]"
kerbrute userenum -d domain.tld --dc x.x.x.x /path/to/username.list > enum_users
Finding Files
find /path/to/directory -type f -exec grep -il "keyword" {} +
find /path/to/directory \( -name "*.key" -o -name "*.pem" -o -name "*.bak" -o -name "*.conf" \) -exec ls -lah {} + 2>/dev/null
Last updated