hping3 172.16.0.7
hping3 --scan 1-30,70-90 -S sscoetjalgaon.ac.in
hping3 -1 10.0.0.25
hping3 -A 10.0.0.25 -p 80
hping3 -2 10.0.0.25 -p 80
hping3 192.168.1.103 -Q -p 139 -s
hping3 -8 50-60 -S 10.0.0.25 -V
hping3 -F -P -U 10.0.0.25 -p 80
hping3 -1 10.0.1.x --rand-dest -I eth0
hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 --flood
hping3 -c 3 10.10.10.10
-c 3
means defining the amount for packets to send.--rand-source
--data <size>
hping3-S <IP address attacked> -a <spoofed IP address>
nmap -O 172.16.0.7
nmap -p 1-65535 -T4 172.16.0.7
nmap -sS 172.16.0.7
dnsenum sscoetjalgaon.ac.in
tlssled sscoetjalgaon.ac.in 443
dmitry -w sscoetjalgaon.ac.in
pof -i eth0 -p -o filename
bed -s HTTP -t 172.16.0.7
bed -s HTTP -t 192.168.1.15
ZAP has installers for Windows, Linux, and Mac OS/X. There are also Docker
images available on the download site listed below.
Step 1 - To open ZapProxy, go to Applications 03-Web Application
Analysis → ZAP.
Step 2 - Click "Accept". ZAP will start to load.
Step 3 - Choose one of the Options and click “Start”.. Preferably select “No, I
do not want to persist this session at this moment in time”.
click "Attack".
Step 4 - Enter URL of the testing web at "URL to attack"
After the scan is completed, on the top left panel you will see all the crawled
sites. In the left panel "Alerts", you will see all the findings along with the
description.
Step 5 Click "Spider" and you will see all the links scanned.
"sqlmap - u URL of victim”.
-i <interface> name or idx of interface (def: first non-loopback)
-c <packet count> stop after n packets (def: infinite)
-w <outfile-> set the output filename (or '-' for stdout)
dd_rescue infilepath outfilepath
pdf-parser -o 10 filepath
, where -o
is the number of objects.