π₯ Kali Linux Commands for Ethical Hacking Tools Here’s a complete list of Kali Linux tools and their commands, categorized by Reconnaissance, Scanning, Exploitation, Wireless Attacks, Password Cracking, and Post-Exploitation . π΅️ 1. Reconnaissance (Information Gathering) WHOIS Lookup sh Copy Edit whois example.com Get domain information. DNS Enumeration sh Copy Edit dig example.com nslookup example.com host example.com Find subdomains & DNS records. Subdomain Discovery sh Copy Edit sublist3r -d example.com List subdomains of a target. Network Scanning (Nmap) sh Copy Edit nmap -sS -p 1-65535 example.com nmap -A -T4 example.com Scan open ports & services. Netcat (Banner Grabbing & Reverse Shell) sh Copy Edit nc -v example.com 80 nc -lvnp 4444 π 2. Web Application Security Nikto (Web Vulnerability Scanner) sh Copy Edit nikto -h http://example.com Scan for vulnerabilities. SQL Injection (SQLmap) sh Copy Edit sqlmap -u "http:/...
Install Kali Linux, set up DVWA, test 5 vulnerabilities, & capture screenshots with date/time. Include 2 installation images. Compile in a Google Doc, enable link sharing (view only) & share the link.
Here is a categorized list of popular penetration testing tools along with their primary uses , organized by phases of the penetration testing lifecycle: π§ 1. Reconnaissance (Information Gathering) Tool Use Nmap Network scanner to discover hosts, open ports, services, and operating systems. Recon-ng Web-based reconnaissance using modules to gather info from various sources. theHarvester Email, subdomain, and name collection via OSINT from search engines and databases. Maltego Graph-based link analysis for mapping relationships between people, companies, domains, etc. Shodan Search engine for Internet-connected devices; finds exposed services. FOCA Extracts metadata from documents found on web servers. π΅️ 2. Scanning & Enumeration Tool Use Nikto Scans web servers for known vulnerabilities and outdated software. Dirb / Gobuster Directory brute-forcing to find hidden files/folders on w...
Comments
Post a Comment