تیم قرمز

برگه رمز هایی برای نفوذگران

سرآغاز لینوکس ویندوز شبکه نکات و ترفند ها روش کار با ابزار ها وب پایگاه داده ها برنامه نویسی بی سیم مهندسی معکوس رمزنگاری پنهان نگاری ارزیابی اطلاعات(osint) منابع

منابع

[1] Mubix. Linux/Unix/BSD Post-Exploitation Command List.
http://bit.ly/nucONO. Accessed on 1- Oct 2012.
[2] Tomes, Tim. Safely DGmping Hashes from Live Domain Controllers.
http://pauldotcom.com/2011/11/safely-dumping-hashes-_from-li v. html. Accessed
on 14 Nov 2012.
[3] Reverse Shell Cheat Sheet. http://pentestmonkey.com/cheat-sheet/shells/reverse-shell-cheat-sheet. Accessed on 15 Nov 2012.
[4] Damele, Bernardo. Reverse Shell One-liners.
htto://bernardodame 1 e.blogscat.com/2Jll/09/reverse-shel-s-one-liners.html.
Accessed on 15 Nov 2012.
[5] SANS Institute. IEE 802.11 Pocket Reference Guide.
httc://www.willhac}:forsushi.com/paoers/80211 Pocket Reference Guide.pdf.
Accessed on 16 Nov 2012.
[6] Tomes, Tim. Remote Malware Deployment and a Lil' AV Bypass.
http://oauldotcom.com/2012/C51remote-malware-deplo·;ment-and.html. Accessed
on 22 Jan 2013.
[ 0 ]
Trusted Sec. Powershell Poe.
httos://www.trusredsec.com/downloads/tools-downloadi. Accessed on 25 Jan
2013.
Following copyright and disclaimer apply:
Copyright 2012 TrustedSec, LLC. All rights reserved.
Redistribution and use in source and binary forms,
with or without
modification, are permitted provided that the following conditions are met:
Redistributions in binarJ form must reproduce the above copJright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY TRUSTEDSEC, LLC "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LitHTED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL TRUSTEDSEC, LLC OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT,INCIDENTAL,SPECIAL,EXEMPLARY,OR CONSEQUENTIAL DAMAGES(INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The views and conclusions contained in the software and documentation are
those of the authors and should not be interpreted as representing official
policies, either expressed or implied, of TRUSTEDSEC, LLC.
[8] SSL and stunnel. httc://www.J:ioptrix.com/blcq/?o=68-. Accessed on 01
Feb 2013.
[9] ''Using Nrnap to Screenshot Web Services''.
h t to:/ /blog. spider labs. com /:2 012/0 6/usinq-nrnao-to-screenshot -'deb-
services.html. Accessed on 26 Feb 2013.
[10] ''Schtasks Persistence with PowerShell One Liners''.
httc://blog.strategicc··ber.com/2013/11/09/schtasks-persistence-with-powershell-one-liners
Accessed on 21 Nov 2013.
[11] https://ired.team/
[12] https://www.nav1n.com/
[13] https://0xprashant.github.io/
[14] https://0x00sec.org/