🔥 Ethical Hacking Command Guide
🔥 Ethical Hacking Command Guide
This guide covers essential ethical hacking commands for reconnaissance, scanning, exploitation, and more. 💻
🛠 1. Reconnaissance & OSINT (Information Gathering)
📌 WHOIS Lookup (Domain Info)
Find domain registration details.
📌 DNS Lookup & Subdomain Enumeration
Find IP addresses & mail servers.
Find subdomains.
📌 Google Dorking (Search Engine Hacking)
Search for sensitive files & exposed directories.
📌 Find Open Ports (Shodan)
Search exposed devices & services.
🔎 2. Network Scanning & Enumeration
📌 Scan Open Ports (Nmap)
Stealth scan all ports.
Aggressive scan (OS detection, version detection).
📌 Detect Live Hosts in a Network
List active devices.
🌐 3. Web Application Security
📌 Web Vulnerability Scanner (Nikto)
Scan for vulnerabilities.
📌 SQL Injection Testing (SQLmap)
Detect & exploit SQL injection.
📌 XSS Vulnerability Scanner
Find XSS vulnerabilities.
📌 Directory Bruteforce (Gobuster)
Find hidden directories & files.
📶 4. Wireless Hacking
📌 Monitor WiFi Networks (Airodump-ng)
Capture WiFi packets.
📌 Crack WiFi (Aircrack-ng)
Crack WPA2 password using a wordlist.
💀 5. Exploitation & Payloads
📌 Metasploit Framework (Start)
Launch Metasploit.
📌 Find Exploits
Find Apache exploits.
📌 Exploit Windows SMB (EternalBlue)
📌 Create Payload (msfvenom)
Generate a Windows reverse shell payload.
🔐 6. Password Cracking
📌 Crack Password with Hashcat
Brute-force an MD5 hash.
📌 Crack Linux User Passwords
🕵️♂️ 7. Man-in-the-Middle (MITM) Attacks
📌 ARP Spoofing (Bettercap)
Start MITM attack.
📌 Capture Traffic (Wireshark)
Monitor live traffic.
⚠️ 8. Anonymity & Privacy
📌 Browse Anonymously (Tor)
📌 Change MAC Address
Randomize MAC address.
Comments
Post a Comment